The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools against mass surveillance. In this work, we propose to add another primitive to that toolbox: Fail-Stop Signatures (FSS) [EC\u2789]. FSS are digital signatures enhanced with a forgery-detection mechanism that can protect a PPT signer from more powerful attackers. Despite the fascinating concept, research in this area stalled after the \u2790s. However, the ongoing transition to post-quantum cryptography, with its hiccups due to the novelty of underlying assumptions, has become the perfect use case for FSS. This paper aims to reboot research on FSS with practical use in mind: Our framework for FSS includes ``fine-grained\u27\u27 security defini...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Recently a completely new post-quantum digital signature scheme was proposed using the so called ``s...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signa...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Recently a completely new post-quantum digital signature scheme was proposed using the so called ``s...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
The potential development of large-scale quantum computers is raising concerns among IT and security...
Security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signa...
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the authenticity of data ...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in ind...
SPHINCS$^{+}$ is a state-of-the-art hash based signature scheme, the security of which is either bas...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Recently a completely new post-quantum digital signature scheme was proposed using the so called ``s...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...