2016
DOI: 10.1007/s10623-016-0276-6
|View full text |Cite
|
Sign up to set email alerts
|

A code-based group signature scheme

Abstract: In this work we propose the first code-based group signature. As it will be described below, its security is based on a relaxation of the model of Bellare, Shi and Zhang [3] (BSZ model) verifying the properties of anonymity, traceability and non-frameability. Furthermore, it has numerous advantages over all existing post-quantum constructions and even competes (in terms of properties) with pairing based constructions: it allows to dynamically add new members and signature and public key sizes are constant with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
33
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 45 publications
(40 citation statements)
references
References 33 publications
1
33
0
1
Order By: Relevance
“…Remark: notice that Stern-like schemes as usually presented are only weaktestable zero knowledge (see [6,Sect. 3.2]).…”
Section: Zero-knowledgementioning
confidence: 99%
See 1 more Smart Citation
“…Remark: notice that Stern-like schemes as usually presented are only weaktestable zero knowledge (see [6,Sect. 3.2]).…”
Section: Zero-knowledgementioning
confidence: 99%
“…Sect. 6 shows a comparison of the parameters of our proposal and other well-known code-based signature schemes, and Sect. 8 draws the conclusions.…”
Section: Introductionmentioning
confidence: 99%
“…For given n and k and for almost all codes a wbounded decoder fails for a proportion ≈ exp(−V n (w)/q n−k ) of the instances. If we choose an integer w > b GV , a wbounded decoder almost never fails 1 . We will speak of a complete 2 decoder.…”
Section: A Syndrome Decodingmentioning
confidence: 99%
“…2. The CFS problem 1 most of the time w = b GV is enough, exceptionally w = b GV + 1 2 the word complete is used here for convenience, the decoder may fail but for a negligible proportion of the instances 2) Security of CFS. : Parity check matrices of high rate Goppa codes can be distinguished from random matrices [6].…”
Section: B Trapdoor Digital Signature (Cfs and Parallel-cfs)mentioning
confidence: 99%
See 1 more Smart Citation