Overview
Explore a conference talk from Eurocrypt 2012 that delves into tightly-secure signatures derived from lossy identification schemes. Learn about common methods for obtaining signature schemes, including Full Domain Hash (FDH) and alternatives with tight security. Examine the exact security of identification-based signatures and discover Fiat-Shamir alternatives offering tight security. Investigate the security aspects of the Fiat-Shamir transform and gain insights into short-discrete-log based identification. This 24-minute presentation by Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, and Mehdi Tibouchi provides a comprehensive overview of advanced cryptographic concepts and their applications in secure signature schemes.
Syllabus
Intro
Common methods for obtaining signature schemes
FDH and alternatives with tight security
On the exact security of identification-based signatures
Fiat-Shamir alternatives with tight security
Security of the Fiat-Shamir transform
Short-discrete-log based ID
Taught by
TheIACR