2020
DOI: 10.1007/978-3-030-62576-4_3
|View full text |Cite
|
Sign up to set email alerts
|

A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 22 publications
0
13
0
Order By: Relevance
“…Our MS 2 and DS 3 have different pros and cons compared with their construction. First, although both MS 2 and [FH20] are proven secure in the plain public-key model, our scheme requires only two rounds of interaction while theirs is a threeround protocol that closely follows the existing paradigm of [BN06]. Due to the "abort" issue we raised earlier, their security proof required an additional hardness assumption rejected Module-LWE (rMLWE).…”
Section: Comparison With Fukumitsu and Hasegawa [Fh20]mentioning
confidence: 99%
“…Our MS 2 and DS 3 have different pros and cons compared with their construction. First, although both MS 2 and [FH20] are proven secure in the plain public-key model, our scheme requires only two rounds of interaction while theirs is a threeround protocol that closely follows the existing paradigm of [BN06]. Due to the "abort" issue we raised earlier, their security proof required an additional hardness assumption rejected Module-LWE (rMLWE).…”
Section: Comparison With Fukumitsu and Hasegawa [Fh20]mentioning
confidence: 99%
“…Due to the interest aroused by the PQC competition, several works were proposed that introduce lattice-based threshold signatures and lattice-based multisignatures. The works [21][22][23][24][25][26] focused on creating multisignatures that followed the FSwA paradigm. These schemes use rejection sampling, due to which the signing process is repeated until a valid signature is created.…”
Section: Related Workmentioning
confidence: 99%
“…In multisignatures [21][22][23][24][25], intermediate values are published before the rejection sampling is completed, which leads to incomplete security proofs in these works [16]. The work by M. Fukumitsu and S. Hasegawa [26] solves the problem with aborted executions of the protocol by introducing a non-standard hardness assumption (rejected Module-LWE).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations