搜索结果: 1-12 共查到“Secure Signatures”相关记录12条 . 查询时间(0.081 秒)
Forward Secure Signatures on Smart Cards
hash-based signatures forward secure signatures smart cards
2018/11/8
We introduce the forward secure signature scheme XMSS++ and present an implementation for smart cards. It is based on the hash-based signature scheme XMSS. In contrast to the only previous implementat...
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Signature scheme indistinguishability obfuscation puncturable pseudo-random functions
2017/10/9
Indistinguishability obfuscation (iO) is a powerful cryptographic tool often employed to construct a variety of core cryptographic primitives such as public key encryption and signatures. In this pape...
Tightly-Secure Signatures from Five-Move Identification Protocols
Signatures Five-Move Identification Protocols Fiat-Shamir
2017/9/14
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform. Concretely, we obtain tightly-secure signatures based on ...
Digital signatures are one of the most important cryptographic primitives. In this work we construct an information-theoretically secure signature scheme which, unlike prior schemes, enjoys a number o...
Transcript Secure Signatures Based on Modular Lattices
lattice techniques digital signatures
2016/1/9
We introduce the notion of a class of lattice-based
digital signature schemes based on modular properties of the coordinates
of lattice vectors. We also suggest a method of making
such schemes tran...
Tightly-Secure Signatures from Chameleon Hash Functions
digital signatures standard model tight reduction
2016/1/5
We give a new framework for obtaining signatures with a tight security reduction from standard
hardness assumptions. Concretely, we show that any Chameleon Hash function can be transformed
into a (b...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
Tightly-Secure Signatures From Lossy Identification Schemes
Signature schemes tight reductions Fiat-Shamir
2014/3/5
In this paper we present three digital signature schemes with tight security reductions. Our first signature scheme is a particularly efficient version of the short exponent discrete log based scheme ...
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World
Quantum computing signatures encryption post-quantum security chosen ciphertext security
2013/4/18
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adversa...
Forward-Secure Signatures with Optimal Signing and Verifying
Forward-Secure Signatures Optimal Signing Verifying
2009/4/16
We propose the first forward-secure signature scheme for
which both signing and verifying are as efficient as for one of the most
efficient ordinary signature schemes (Guillou-Quisquater [GQ88]), ea...
In regular digital signatures, once the secret key is compromised, all signatures, even those
that were issued by the honest signer before the compromise, will not be trustworthy any more.
Forward-s...
Forward-Secure Signatures with Untrusted Update
Forward-Secure Signatures Untrusted Update
2008/12/16
In most forward-secure signature constructions, a program that updates a user’s private signing key must have full access to the private key. Unfortunately, these schemes are incompatible with several...