We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model (ROM or QROM), in both unstructured and structured lattices, based on the SIS or RSIS assumption. These signatures are short (of size independent of the message length). Our schemes build upon a work from Pan and Wagner (PQCrypto’21) and improve on it in several ways. First, we prove their transformation from nonadaptive to adaptive IBS in the QROM. Then, we simplify the parameters used and give concrete values. Finally, we simplify the signature scheme by using a non-homogeneous relation, which helps us reduce the size of the signature and get rid of one costly trapdoor delegation. On the who...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
International audienceWe provide identity-based signature (IBS) schemes with tight security against ...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Quantum-access security, where an attacker is granted superposition access to secret-keyed functiona...
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (G...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
We describe an adaptation of Schnorr\u27s signature to the lattice setting, which relies on Gaussian...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
International audienceWe provide identity-based signature (IBS) schemes with tight security against ...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Quantum-access security, where an attacker is granted superposition access to secret-keyed functiona...
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (G...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
We describe an adaptation of Schnorr\u27s signature to the lattice setting, which relies on Gaussian...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...