In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the φ- hiding assumptions. We do so by proving that the underlying identification schemes used in these schemes are a particular case of the lossy identification notion recently introduced by Abdalla et al. at Eurocrypt 2012. Next, we show how to extend these results to the forward-security setting based on ideas from the Itkis-Reyzin forward-secure signature scheme. Unlike the original Itkis-Reyzin scheme, our construction can be instantiated under different decisional complexit...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceIn this paper we present three digital signature schemes with tight security r...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
International audienceIn this paper, we present three digital signature schemes with tight security ...
CHANATHIP NAMPREMPRE We consider the usage of forward security with threshold signature schemes. Thi...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceIn this paper we present three digital signature schemes with tight security r...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
International audienceIn this paper, we present three digital signature schemes with tight security ...
CHANATHIP NAMPREMPRE We consider the usage of forward security with threshold signature schemes. Thi...
We describe a digital signature scheme in which the public key is xed but the secret signing key is ...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Abstract. We propose the first forward-secure signature scheme for which both signing and verifying ...