Summary
$$ \newcommand{\ECM}{\exists\textrm{CM}} $$

26 April 2022

Summary

By now we have seen general techniques in constructing \(\ECM^+\) secure signature schemes. The roadmap is summarised below. Arrows represent direct implications.

Although theoretically satisfactory, this is not the end of the story. In the remaining chapters we will study more concrete \(\ECM^+\) secure schemes that aim at improving performance and/or providing new features. In particular we investigate two genres:

Our exposition will shift to a less formal (but still rigorous) language and focus on the gist.

Return↩︎