Главная
Study mode:
on
1
Intro
2
Motivation
3
Threshold Ring Signature Setting
4
Passive Adversaries
5
Post-Quantum Hardness Assumptions
6
Proof Techniques in Post-Quantum Setting
7
Rewinding
8
Quantum vs Classical Access
9
Definitions
10
Anonymity and Unforgeability
11
Oracles
12
Post-Quantum Secure Problem and Technique
13
Trapdoor Commitment Scheme
14
Shamir Secret Sharing
15
Protocol
16
Template
17
Core Technique
18
Unruh Transformation
19
Summary
20
Questions for Future Research
Description:
Explore threshold ring signatures, their new definitions, and post-quantum security in this conference talk presented at PKC 2020. Delve into the paper by Abida Haque and Alessandra Scafuro, covering topics such as passive adversaries, post-quantum hardness assumptions, and proof techniques in post-quantum settings. Examine anonymity and unforgeability definitions, oracles, and post-quantum secure problems. Learn about key techniques including trapdoor commitment schemes, Shamir secret sharing, and the Unruh transformation. Conclude with a summary and questions for future research in this cutting-edge cryptographic field.

Threshold Ring Signatures: New Definitions and Post-Quantum Security

TheIACR
Add to list
0:00 / 0:00