all InfoSec news
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Oct. 30, 2023, 2:24 a.m. |
IACR News www.iacr.org
ePrint Report: Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi, Yu Xia
In STOC 2019 Canetti et al. showed how to soundly instantiate the Fiat-Shamir transform assuming that prover and verifier have access to the key of a ??????????? ??????????? ℎ??ℎ ???????? ??? ??????????? ?????ℎ???? ?????????. The transform requires the starting protocol to be a special 3-round public-coin scheme that Canetti et al. call ???????? ?????-????????. One downside of the Canetti et al. approach is that the key of …
access correlation eprint report functions hash hash functions key protocol report the key transform
More from www.iacr.org / IACR News
Compact Key Storage: A Modern Approach to Key Backup and Delegation
1 day, 15 hours ago |
www.iacr.org
Quantum Evolving Secret Sharing for General Access Structures
1 day, 15 hours ago |
www.iacr.org
Preliminary Analysis of Ascon-Xof and Ascon-Hash
1 day, 16 hours ago |
www.iacr.org
PhD Student in Cryptography
1 day, 20 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Senior Security Researcher - Linux MacOS EDR (Cortex)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Sr. Manager, NetSec GTM Programs
@ Palo Alto Networks | Santa Clara, CA, United States
SOC Analyst I
@ Fortress Security Risk Management | Cleveland, OH, United States