We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation of signature schemes, concrete instantiations of which can be found in MQ-based, code-based, and latticebased cryptography. Moreover, we revisit and expand on a transformation by Szepieniec et al. [39] to shrink the public key at the cost of a larger signature while reducing their combined size. This transformation can be used in a way that is provably secure in the random oracle model, and in a more aggressive variant whose security remained unproven. In this paper we show that this transformation applies to any constrained linear trapdoor signature scheme, and prove the security of the first mode in the quantum random oracle model. Moreover...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Due to the threat of scalable quantum computation breaking existing public-key cryptography, interes...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
The interest in post-quantum cryptography - classical systems that remain secure in the presence of ...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
We revisit the construction of IND-CCA secure key encapsulation mechanisms (KEM) from public-key enc...
Threshold signature schemes enable distribution of the signature issuing capability to multiple user...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Due to the threat of scalable quantum computation breaking existing public-key cryptography, interes...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
The interest in post-quantum cryptography - classical systems that remain secure in the presence of ...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
We revisit the construction of IND-CCA secure key encapsulation mechanisms (KEM) from public-key enc...
Threshold signature schemes enable distribution of the signature issuing capability to multiple user...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...