International audienceIn this paper we present three digital signature schemes with tight security reductions. Our first signature scheme is a particularly efficient version of the short exponent discrete log based scheme of Girault et al. (J. of Cryptology 2006). Our scheme has a tight reduction to the decisional Short Discrete Logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the original scheme of Girault et al. is based. The second signature scheme we construct is a modification of the scheme of Lyubashevsky (Asiacrypt 2009) that is based on the worst-case hardness of the shortest vector problem in ideal lattices. And the third scheme is a very simple signature sche...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
International audienceIt is known how to transform certain canonical three-pass identification schem...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
International audienceIn this paper we present three digital signature schemes with tight security r...
International audienceIn this paper, we present three digital signature schemes with tight security ...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We present a signature scheme with the tightest security-reduction among known constant-size signatu...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
International audienceIt is known how to transform certain canonical three-pass identification schem...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
International audienceIn this paper we present three digital signature schemes with tight security r...
International audienceIn this paper, we present three digital signature schemes with tight security ...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We present a signature scheme with the tightest security-reduction among known constant-size signatu...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
International audienceIt is known how to transform certain canonical three-pass identification schem...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...