We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the communication of the Fiat Shamir authentication scheme to a single round while preserving the e±ciency of the scheme. This also reduces the length of Fiat Shamir signatures. Using secret keys consisting of small integers we reduce the time for signature generation by a factor 3 to 4. We propose a variation of our scheme using class groups that may be secure even if factoring large integers becomes easy
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-b...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
This paper provides a framework to treat the problem of building signature schemes from identificati...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortuna...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-b...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
This paper provides a framework to treat the problem of building signature schemes from identificati...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortuna...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-b...