Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols.
Lior RotemGil SegevPublished in: J. Cryptol. (2024)
Keyphrases
- security protocols
- communication protocols
- wide range
- information security
- signature recognition
- key agreement protocol
- cryptographic protocols
- upper bound
- secure multiparty computation
- security services
- authentication protocol
- security properties
- key distribution
- trusted third party
- lower bound
- access control
- network security
- intrusion detection
- key management
- security mechanisms
- security requirements
- transaction processing systems
- anti collision
- johnson lindenstrauss
- security level
- security model
- zernike moments
- privacy preserving