In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the $\phi$-hiding assumptions. We do so by proving that the underlying identification schemes used in these schemes are a particular case of the lossy identification notion recently introduced by Abdalla et al. at Eurocrypt 2012. Next, we show how to extend these results to the forward-security setting based on ideas from the Itkis-Reyzin forward-secure signature scheme. Unlike the original Itkis-Reyzin scheme, our construction can be instantiated under different decisional compl...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
International audienceIn this paper we present three digital signature schemes with tight security r...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
This paper provides a framework to treat the problem of building signature schemes from identificati...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
We consider the usage of forward security with threshold signature schemes. This means that even if...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceIt is known how to transform certain canonical three-pass identification schem...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
International audienceIn this paper we present three digital signature schemes with tight security r...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
This paper provides a framework to treat the problem of building signature schemes from identificati...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
We consider the usage of forward security with threshold signature schemes. This means that even if...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceIt is known how to transform certain canonical three-pass identification schem...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
SUMMARY There are three well-known identification schemes: the Fiat-Shamir, GQ and Schnorr identific...
Abstract We describe a digital signature scheme in which the public key is fixed but the secret sign...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...