Tightly-Secure Signatures from Lossy Identification Schemes

Tightly-Secure Signatures from Lossy Identification Schemes

TheIACR via YouTube Direct link

On the exact security of identification-based signatures

4 of 7

4 of 7

On the exact security of identification-based signatures

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Tightly-Secure Signatures from Lossy Identification Schemes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Common methods for obtaining signature schemes
  3. 3 FDH and alternatives with tight security
  4. 4 On the exact security of identification-based signatures
  5. 5 Fiat-Shamir alternatives with tight security
  6. 6 Security of the Fiat-Shamir transform
  7. 7 Short-discrete-log based ID

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.