2020
DOI: 10.1007/978-3-030-45727-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Signatures from Sequential-OR Proofs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 53 publications
0
18
0
Order By: Relevance
“…As a second application of our multi-input reprogrammability result, we show QROM-security of the non-interactive OR-proof introduced by Liu, Wei and Wong [12], further analyzed by Fischlin, Harasser and Janson [10]. While the well-known (interactive) OR-proof by Cramer, Damgård and Schoenmakers [7] is a Σ-protocol and thus the results from [9] apply, the inherently non-interactive OR-proof by Liu et al does not is not obtained as the FS transformation of a Σ-protocol (though in some sense it is "close" to being of this form).…”
Section: Introductionmentioning
confidence: 71%
See 3 more Smart Citations
“…As a second application of our multi-input reprogrammability result, we show QROM-security of the non-interactive OR-proof introduced by Liu, Wei and Wong [12], further analyzed by Fischlin, Harasser and Janson [10]. While the well-known (interactive) OR-proof by Cramer, Damgård and Schoenmakers [7] is a Σ-protocol and thus the results from [9] apply, the inherently non-interactive OR-proof by Liu et al does not is not obtained as the FS transformation of a Σ-protocol (though in some sense it is "close" to being of this form).…”
Section: Introductionmentioning
confidence: 71%
“…Indeed, [12] shows security of the sequential OR in the (classical) ROM. [10] go a step further and show security in the (classical) non-programmable ROM. Here we show that our multi-input version of the measure-and-reprogram result (as a matter of fact the 2-input version) implies security in the QROM.…”
Section: Sequential or Proofsmentioning
confidence: 97%
See 2 more Smart Citations
“…The other type of the meta-reduction is that M can simulate the random oracle for R. Fischlin, Harasser, and Janson [25] used this type of meta-reduction implicitly to show the impossibility of the security of a signature scheme yielded from a parallel-OR protocol, under some cryptographic assumption as long as the same assumption holds. They succeeded in the simulation of F by allowing M to use the programming technique.…”
Section: Our Contributionsmentioning
confidence: 99%