Forking lemma

The forking lemma is any of a number of related lemmas in cryptography research. The lemma states that if an adversary (typically a probabilistic… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many… (More)
  • table 1
Is this relevant?
2013
2013
In this paper we construct a new trace model of delay-insensitive asynchronous circuits inspired by Ebergen’s model in such a way… (More)
  • figure 1
Is this relevant?
2013
2013
We give a description of the model theoretic relation of forking independence in terms of the notion of JSJ decompositions in non… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
We introduce the notion of a preindependence relation between subsets of the big model of a complete first-order theory, an… (More)
  • figure 1
Is this relevant?
2009
2009
We study thorn forking and rosiness in the context of continuous logic. We prove that the Urysohn sphere is rosy (with respect to… (More)
Is this relevant?
2008
2008
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
This paper offers arguments for the provable security of a class of ID-based signature schemes called ID-based generic signature… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many… (More)
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering… (More)
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Time-dependent optimization problems pose a new challenge to evolutionary algorithms, since they not only require a search for… (More)
  • figure 1
  • figure 3
  • figure 4
Is this relevant?