Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tightly-Secure Signatures from Lossy Identification Schemes

TheIACR via YouTube

Overview

Explore a conference talk from Eurocrypt 2012 that delves into tightly-secure signatures derived from lossy identification schemes. Learn about common methods for obtaining signature schemes, including Full Domain Hash (FDH) and alternatives with tight security. Examine the exact security of identification-based signatures and discover Fiat-Shamir alternatives offering tight security. Investigate the security aspects of the Fiat-Shamir transform and gain insights into short-discrete-log based identification. This 24-minute presentation by Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, and Mehdi Tibouchi provides a comprehensive overview of advanced cryptographic concepts and their applications in secure signature schemes.

Syllabus

Intro
Common methods for obtaining signature schemes
FDH and alternatives with tight security
On the exact security of identification-based signatures
Fiat-Shamir alternatives with tight security
Security of the Fiat-Shamir transform
Short-discrete-log based ID

Taught by

TheIACR

Reviews

Start your review of Tightly-Secure Signatures from Lossy Identification Schemes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.