1. From identification to signatures via the Fiat–Shamir transform: Minimizing assumptions for security and forward-security;Abdalla,2002
2. How to go beyond the black-box simulation barrier;Barak,2001
3. On extractability obfuscation;Boyle,2014
4. Why “Fiat–Shamir for proofs” lacks a proof;Bitansky,2013
5. Non-interactive zero-knowledge and its applications (extended abstract);Blum,1988