On Provable Security for Digital Signature Algorithms
نویسندگان
چکیده
منابع مشابه
Digital Signatures Out of Second-Preimage Resistant Hash Functions
We propose a new construction for Merkle authentication trees which does not require collision resistant hash functions; in contrast with previous constructions that attempted to avoid the dependency on collision resistance, our technique enjoys provable security assuming the well-understood notion of second-preimage resistance. The resulting signature scheme is existentially unforgeable when t...
متن کاملThe Korean Certiicate-based Digital Signature Algorithm
As a contribution to IEEE P1363a, we propose a provably secure digital signature algorithm called the Korean Certiicate-based Digital Signature Algorithm (KCDSA, in short) and its elliptic curve variant (EC-KCDSA). We believe that the proposed signature schemes are more advantageous than DSA/EC-DSA in both security and ee-ciency. No patent related with KCDSA/EC-KCDSA has been submitted, and the...
متن کاملDigital Signature Scheme Based on Action of Infinite Ring
An original digital signature scheme based on action of infinite ring on module is presented. It is assumed that the ring contains an infinite multiplicative monoid. The ring action is defined as monoid elements's action on the module element as an operator. The signature scheme is based on particularly designed one–way functions (OWFs), using a postulated hard problem in monoid action level. T...
متن کاملA Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signer or the designated verifier as well. Due to its merits, the directed signature scheme can be applied on some personally or commercially sensitive occasions. Up to now, there are several directed signature schemes havi...
متن کاملProvable security and fairness in cryptographic identification and signature schemes / Sécurité prouvée et équité dans les schémas cryptographiques d'identification et de signature
Identification schemes are public-key cryptographic primitives that allow an entity (called the prover) to prove his or her identity to another entity. An identification scheme is secure if no attacker can impersonate the prover. Digital signature schemes allow an entity to produce a signature on a message; given the message and the signature, another entity can check the identity of the signer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996