Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-Protocols.
Lior RotemGil SegevPublished in: CRYPTO (1) (2021)
Keyphrases
- security protocols
- security properties
- signature recognition
- key agreement protocol
- communication protocols
- authentication protocol
- upper bound
- security issues
- key exchange
- security services
- cryptographic protocols
- wide range
- security analysis
- key establishment
- key management
- security requirements
- network security
- access control
- security level
- security mechanisms
- security policies
- information security
- high dimensional
- lower bound