On Concrete Security Treatment of Signatures Derived from Identi cation
نویسندگان
چکیده
Signature schemes that are derived from three move identi cation schemes such as the Fiat-Shamir, Schnorr and modi ed ElGamal schemes are a typical class of the most practical signature schemes. The random oracle paradigm [1, 2, 12] is useful to prove the security of such a class of signature schemes [4, 12]. This paper presents a new key technique, \ID reduction", to show the concrete security result of this class of signature schemes under the random oracle paradigm. First, we apply this technique to the Schnorr and modi ed ElGamal schemes, and show the \concrete security analysis" of these schemes. We then apply it to the multi-signature schemes.
منابع مشابه
On Concrete Security Treatment of Signatures Derived from Identification
Signature schemes that are derived from three move identification schemes such as the Fiat-Shamir, Schnorr and modified ElGamal schemes are a typical class of the most practical signature schemes. The random oracle paradigm [1,2,12] is useful to prove the security of such a class of signature schemes [4,12]. This paper presents a new key technique, “ID reduction”, to show the concrete security ...
متن کاملSOFIA: MQ-based signatures in the QROM
We propose SOFIA, the rst MQ-based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh's transform for 5-pass identi cation schemes that we describe and prove secure both in the ROM and QROM. Based on a detailed security analysis, we provide concrete parameters for SOFIA that achieve 128 bit post-quantum ...
متن کاملSECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS
In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...
متن کاملIdenti cation of Bad Signatures in BatchesJaros
The paper addresses the problem of bad signature identii-cation in batch veriication of digital signatures. The number of generic tests necessary to identify all bad signatures in a batch instance, is used to measure the eeciency of veriiers. The divide-and-conquer veri-er DCV(x; n) is deened. The veriier identiies all bad signatures in a batch instance x of the length n by repeatedly splitting...
متن کاملProperties and Usage of Closed-loop Identiication Methods Properties and Usage of Closed-loop Identiication Methods
System identi cation deals with the construction of mathematical models of dynamical systems using measured data. Closed-loop identi cation is what results when performing the identi cation experiment under output feedback, that is, in closed loop. In this thesis we study a number of closed-loop identi cation methods, both classical and more recently suggested ones. A common feature of the meth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998