2021
DOI: 10.1007/978-3-030-81293-5_19
|View full text |Cite
|
Sign up to set email alerts
|

Short Identity-Based Signatures with Tight Security from Lattices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(23 citation statements)
references
References 38 publications
0
23
0
Order By: Relevance
“…Related Work. There are two main approaches used to construct IBS schemes (see [18] for more details), but none of them is directly applicable to tight post-quantum security (more discussion in [26]). The first one, called the certification approach, transforms a standard signature scheme into an IBS scheme [9,4].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Related Work. There are two main approaches used to construct IBS schemes (see [18] for more details), but none of them is directly applicable to tight post-quantum security (more discussion in [26]). The first one, called the certification approach, transforms a standard signature scheme into an IBS scheme [9,4].…”
Section: Introductionmentioning
confidence: 99%
“…Overcoming these difficulties, Pan and Wagner gave in [26] the first identity-based signature scheme with tight security from lattices, and we build upon their construction by improving on it in several ways. They give two constructions, based on either SIS [1] (unstructured lattices) or Ring-SIS [24] (structured lattices), which are two assumptions believed to be quantum-safe.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Practical identity-based signature (IBS) scheme was not presented until Shamir' pioneering research. Since then, many IBS schemes [18][19][20][21][22] with different functionality and security properties have been proposed.…”
Section: Introductionmentioning
confidence: 99%