A Modular Treatment of Blind Signatures from Identification Schemes

A Modular Treatment of Blind Signatures from Identification Schemes

TheIACR via YouTube Direct link

Linear Hash Function ID Scheme

7 of 16

7 of 16

Linear Hash Function ID Scheme

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Modular Treatment of Blind Signatures from Identification Schemes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 One-More Unforgeability
  3. 3 Motivation: Anonymous
  4. 4 Compact Blind Signatures
  5. 5 Linear Hash Functions
  6. 6 (Three-Move) ID Scheme
  7. 7 Linear Hash Function ID Scheme
  8. 8 One-More Man-in-the-Middle Security (OMMIM)
  9. 9 Security of Linear ID Scheme
  10. 10 Proof Ingredients
  11. 11 Main Technical Ingredient: New Forking Lemma
  12. 12 Generic Framework Linear Hash Function
  13. 13 From Linear ID to Blind Signatures
  14. 14 Example: Okamoto-Schnorr
  15. 15 Summary
  16. 16 Open Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.