International audienceIn this paper we present three digital signature schemes with tight security reductions. Our first signature scheme is a particularly efficient version of the short exponent discrete log based scheme of Girault et al. (J. of Cryptology 2006). Our scheme has a tight reduction to the decisional Short Discrete Logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the original scheme of Girault et al. is based. The second signature scheme we construct is a modification of the scheme of Lyubashevsky (Asiacrypt 2009) that is based on the worst-case hardness of the shortest vector problem in ideal lattices. And the third scheme is a very simple signature sche...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
The Schnorr signature scheme is the most efficient signature scheme based on the discrete loga-rithm...
International audienceIn this paper we present three digital signature schemes with tight security r...
International audienceIn this paper, we present three digital signature schemes with tight security ...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a signature scheme provably secure in the standard model (no random oracles) based on the...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
At Eurocrypt '03, Goh and Jarecki showed that, contrary to other signature schemes in the discr...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
The Schnorr signature scheme is the most efficient signature scheme based on the discrete loga-rithm...
International audienceIn this paper we present three digital signature schemes with tight security r...
International audienceIn this paper, we present three digital signature schemes with tight security ...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a signature scheme provably secure in the standard model (no random oracles) based on the...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
At Eurocrypt '03, Goh and Jarecki showed that, contrary to other signature schemes in the discr...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
The Schnorr signature scheme is the most efficient signature scheme based on the discrete loga-rithm...