2020 15th Asia Joint Conference on Information Security (AsiaJCIS) 2020
DOI: 10.1109/asiajcis50894.2020.00016
|View full text |Cite
|
Sign up to set email alerts
|

Linear Lossy Identification Scheme derives Tightly-Secure Multisignature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Thus a tight security proof makes the parameter of the scheme be compact as that of the underlying cryptographic assumption. Although several multisignature schemes with tight security have been proposed in [1,19,8,9,21], none of them support the public-key aggregation. Therefore, constructing a multisignature with public-key aggregation having a tight security proof is an important open question.…”
Section: Introductionmentioning
confidence: 99%
“…Thus a tight security proof makes the parameter of the scheme be compact as that of the underlying cryptographic assumption. Although several multisignature schemes with tight security have been proposed in [1,19,8,9,21], none of them support the public-key aggregation. Therefore, constructing a multisignature with public-key aggregation having a tight security proof is an important open question.…”
Section: Introductionmentioning
confidence: 99%