2021
DOI: 10.1007/978-3-030-75248-4_1
|View full text |Cite
|
Sign up to set email alerts
|

More Efficient Digital Signatures with Tight Multi-user Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…As an instantiation of our approach, we prove that under the strong CDH assumption the classical Burmester-Desmedt protocol is a tightly secure VGKE protocol [12]. Combining with a tightly StCorrCMA-secure signature (for instance, [17]), it yields the first tightly secure GAKE protocol. Alternatively, our transformation can be viewed as a tight improvement on the (non-tight) generic compiler of Katz and Yung [31] where we require the underlying non-authenticated group key exchange protocol to be verifiable.…”
Section: An Extension and Open Problemsmentioning
confidence: 96%
See 4 more Smart Citations
“…As an instantiation of our approach, we prove that under the strong CDH assumption the classical Burmester-Desmedt protocol is a tightly secure VGKE protocol [12]. Combining with a tightly StCorrCMA-secure signature (for instance, [17]), it yields the first tightly secure GAKE protocol. Alternatively, our transformation can be viewed as a tight improvement on the (non-tight) generic compiler of Katz and Yung [31] where we require the underlying non-authenticated group key exchange protocol to be verifiable.…”
Section: An Extension and Open Problemsmentioning
confidence: 96%
“…For preparation, we assume that a Test session does not contain any valid forgeries. This can be tightly justified by the StCorrCMA security of the underlying signature scheme, which can be instantiated with the recent scheme in [17].…”
Section: Our Contributionmentioning
confidence: 99%
See 3 more Smart Citations