Keyword : tight reduction


Meeting Tight Security for Multisignatures in the Plain Public Key Model
Naoto YANAI 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9 ; pp. 1484-1493
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multisignaturesplain public key modelprovable securitytight reductionrandom oracle modelCDH problem
 Summary | Full Text:PDF(690.6KB)

Tighter Reductions for Deterministic Identity-Based Signatures
Naoto YANAI Toru FUJIWARA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 64-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
identity-based signaturesdeterministic identity-based signaturesprovable securityCDH problemrandom oracle modeltight reduction
 Summary | Full Text:PDF(874KB)

Provably Secure Structured Signature Schemes with Tighter Reductions
Naoto YANAI Tomoya IWASAKI Masaki INAMURA Keiichi IWAMURA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9 ; pp. 1870-1881
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
structured signaturesidentity-based structured signaturesprovable securityCDH problemrandom oracle modeltight reduction
 Summary | Full Text:PDF(1008.4KB)

A Tightly-Secure Multisignature Scheme with Improved Verification
Jong Hwan PARK Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2 ; pp. 579-589
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multisignatureproof-of-possessionbilinear mapscoCDH problemtight reductionPOP-sKR model
 Summary | Full Text:PDF(665.3KB)

An Identification Scheme with Tight Reduction
Seiko ARITA Natsumi KAWASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1949-1955
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
identification schemerewindingKEA1 assumptiontight reduction
 Summary | Full Text:PDF(179.1KB)