Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols.
Lior RotemGil SegevPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- security protocols
- signature recognition
- cryptographic protocols
- wide range
- access control
- key agreement protocol
- authentication protocol
- security services
- upper bound
- security properties
- communication protocols
- security requirements
- intrusion detection
- key distribution
- secure multiparty computation
- messages exchanged
- application level
- computer security
- zernike moments
- information security
- lower bound