We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert three-move identification protocols into two-tier signature schemes with a proof of security that makes a standard assumption on the hash function rather than modeling it as a random oracle. The result requires security of the starting protocol against concurrent attacks. We can show that numerous protocols have the required properties and so obtain numerous efficient two-tier schemes. Our first application is a two-tier scheme based efficient transform of any unforgeable signature scheme into a strongly unforgeable one. (This extends Boneh, Shen and Waters [BSW06] whose transform only applies to a limited class of schem...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceIt is known how to transform certain canonical three-pass identification schem...
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
This paper provides a framework to treat the problem of building signature schemes from identificati...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceIt is known how to transform certain canonical three-pass identification schem...
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
This paper provides a framework to treat the problem of building signature schemes from identificati...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...