[HTML][HTML] Digital signature schemes with strong existential unforgeability

J Chia, JJ Chin, SC Yip - F1000Research, 2021 - ncbi.nlm.nih.gov
Digital signature schemes (DSS) are ubiquitously used for public authentication in the
infrastructure of the internet, in addition to their use as a cryptographic tool to construct even …

Scalable group signatures with revocation

B Libert, T Peters, M Yung - … 2012: 31st Annual International Conference on …, 2012 - Springer
Group signatures are a central cryptographic primitive, simultaneously supporting
accountability and anonymity. They allow users to anonymously sign messages on behalf of …

Non-interactive key exchange

ESV Freire, D Hofheinz, E Kiltz, KG Paterson - Public-Key Cryptography …, 2013 - Springer
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …

Programmable hash functions from lattices: short signatures and IBEs with small key sizes

J Zhang, Y Chen, Z Zhang - Annual international cryptology conference, 2016 - Springer
Driven by the open problem raised by Hofheinz and Kiltz 34, we study the formalization of
lattice-based programmable hash function (PHF), and give two types of constructions by …

Tightly-secure signatures from chameleon hash functions

O Blazy, SA Kakvi, E Kiltz, J Pan - … Conference on Practice and Theory in …, 2015 - Springer
We give a new framework for obtaining signatures with a tight security reduction from
standard hardness assumptions. Concretely, we show that any Chameleon Hash function …

Synchronized aggregate signatures from the RSA assumption

S Hohenberger, B Waters - Annual International Conference on the Theory …, 2018 - Springer
In this work we construct efficient aggregate signatures from the RSA assumption in the
synchronized setting. In this setting, the signing algorithm takes as input a (time) period t as …

Fault-tolerant aggregate signatures

G Hartung, B Kaidel, A Koch, J Koch… - Public-Key Cryptography …, 2016 - Springer
Aggregate signature schemes allow for the creation of a short aggregate of multiple
signatures. This feature leads to significant reductions of bandwidth and storage space in …

Removing the strong RSA assumption from arguments over the integers

G Couteau, T Peters, D Pointcheval - … on the Theory and Applications of …, 2017 - Springer
Committing integers and proving relations between them is an essential ingredient in many
cryptographic protocols. Among them, range proofs have been shown to be fundamental …

Concise multi-challenge CCA-secure encryption and signatures with almost tight security

B Libert, M Joye, M Yung, T Peters - … on the Theory and Application of …, 2014 - Springer
To gain strong confidence in the security of a public-key scheme, it is most desirable for the
security proof to feature a tight reduction between the adversary and the algorithm solving …

Practical signatures from standard assumptions

F Böhl, D Hofheinz, T Jager, J Koch, JH Seo… - Advances in Cryptology …, 2013 - Springer
We put forward new techniques for designing signature schemes. As a result, we present
practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our …