Tight Security Reductions Theorem (template) If an adversary A(t.e)-breaks the scheme II in the defined security model, there exists an algorithm that (t',')-breaks some computation problem
4
Digital Signatures
5
Our Method
6
Katz-Wang's Magic Bit KW'03
7
Short Integer Solution (SIS) Problem and Trapdoors Definition
8
Proof Idea of Boyen's Signature
9
Our Signature Scheme
10
Conclusion
Description:
Explore a talk from Asiacrypt 2016 by Xavier Boyen and Qinyi Li on tightly secure lattice short signatures and ID-based encryption. Delve into the motivations behind tight security reductions and examine the theorem template for breaking computational problems. Investigate digital signatures, focusing on the Katz-Wang magic bit technique and the Short Integer Solution (SIS) problem with trapdoors. Learn about Boyen's signature proof idea and the presenters' proposed signature scheme. Gain insights into advanced cryptographic concepts and their applications in secure communication systems.
Towards Tightly Secure Lattice Short Signature and Id Based Encryption