International audienceIt is known how to transform certain canonical three-pass identification schemes into signature schemes via the Fiat–Shamir transform. Pointcheval and Stern showed that those schemes are existentially unforgeable in the random-oracle model leveraging the, at that time, novel forking lemma. Recently, a number of 5-pass identification protocols have been proposed. Extending the above technique to capture 5-pass identification schemes would allow to obtain novel unforgeable signature schemes. In this paper, we provide an extension of the forking lemma (and the Fiat–Shamir transform) in order to assess the security of what we call n-generic signature schemes. These include signature schemes that are derived from certain (2...
preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave th...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
In this paper we present a family of transforms that map existentially unforgeable signature schemes...
International audienceIt is known how to transform certain canonical three-pass identification schem...
International audienceThe well-known forking lemma by Pointcheval and Stern has been used to prove t...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
This paper provides a framework to treat the problem of building signature schemes from identificati...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We present a generic forgery attack on signature schemes constructed from 5-round identification sch...
International audienceIn this paper we present three digital signature schemes with tight security r...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
Part 2: Security EngineeringInternational audienceIn this paper we present efficient implementations o...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave th...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
In this paper we present a family of transforms that map existentially unforgeable signature schemes...
International audienceIt is known how to transform certain canonical three-pass identification schem...
International audienceThe well-known forking lemma by Pointcheval and Stern has been used to prove t...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
This paper provides a framework to treat the problem of building signature schemes from identificati...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We present a generic forgery attack on signature schemes constructed from 5-round identification sch...
International audienceIn this paper we present three digital signature schemes with tight security r...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
Part 2: Security EngineeringInternational audienceIn this paper we present efficient implementations o...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave th...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
In this paper we present a family of transforms that map existentially unforgeable signature schemes...