Public key signatures in the multi-user setting
References (6)
- et al.
Public-key encryption in a multi-user setting: Security proofs and improvements
- et al.
The exact security of digital signatures—How to sign with RSA and Rabin
- et al.
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Cited by (41)
Generalized public-key cryptography with tight security
2019, Information SciencesCitation Excerpt :The models consider more realistic threats in practice, where the adversary receives multiple public keys and chooses one as the challenge public key. The security models of signature and public-key encryption (PKE) schemes in the multi-user setting were introduced in [13] and [7], respectively. The security models in the multi-user setting with corruptions (MU-C) give the adversary more powerful capabilities.
Tightly secure signature schemes from the LWE and subset sum assumptions
2019, Theoretical Computer ScienceA generic construction of tightly secure signatures in the multi-user setting
2019, Theoretical Computer ScienceEfficient multi-party concurrent signature from lattices
2016, Information Processing LettersCitation Excerpt :Owing to the feature, concurrent signature schemes are useful in some actual settings including contract signing. Along with the work of Chen et al., some related researches are proposed in recent years [2–12], the above work mainly consists of two-user setting or multi-user setting. Mu et al. [2] and Chow et al. [3] proposed two perfect concurrent signature schemes.
Limits in the Provable Security of ECDSA Signatures
2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Security Analysis of RSA-BSSA
2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)