Publication | Closed Access
Fiat-Shamir: from practice to theory
188
Citations
15
References
2019
Year
Unknown Venue
Computable Hash FunctionsCryptographic PrimitiveEngineeringComputational ComplexityCryptographic ProtocolFormal VerificationHardware SecurityEconomicsFinancial TechnologyData PrivacyHash FunctionFiat-shamir TransformComputer ScienceNew InstantiationsData SecurityCryptographyCryptographic ProtectionFormal MethodsHomomorphic Encryption
We give new instantiations of the Fiat-Shamir transform using explicit, efficiently computable hash functions. We improve over prior work by reducing the security of these protocols to qualitatively simpler and weaker computational hardness assumptions. As a consequence of our framework, we obtain the following concrete results.
| Year | Citations | |
|---|---|---|
Page 1
Page 1