메뉴 건너뛰기




Volumn , Issue , 2003, Pages 102-113

On the (In)security of the Fiat-Shamir paradigm

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; THEOREM PROVING;

EID: 0344550529     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (153)

References (29)
  • 2
    • 0002716562 scopus 로고    scopus 로고
    • How to go beyond the black-box simulation barrier
    • B. Barak. How to go beyond the black-box simulation barrier. In Proc. of the 42nd FOCS, 2001.
    • Proc. of the 42nd FOCS, 2001
    • Barak, B.1
  • 3
    • 0010402853 scopus 로고    scopus 로고
    • Identity-based encryption from Weil pairing
    • Preliminary version in Crypto
    • D. Boneh and M. Franklin. Identity-based encryption from Weil pairing. Preliminary version in Crypto, 2001.
    • (2001)
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum, S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput. 13(4): 850-864 1984.
    • (1984) SIAM J. Comput. , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 12
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • U. Feige, A.Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2), pp. 77-94, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 13
    • 84990731886 scopus 로고
    • How to prove to yourself: Practical solutions to identification and signature problems
    • Springer, Berlin
    • Amos Fiat and Adi Shamir. How to prove to yourself: practical solutions to identification and signature problems. In Advances in Cryptology-Crypto 86, pages 186-194, Springer, Berlin 1987.
    • (1987) Advances in Cryptology-Crypto 86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2): 281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 19
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments
    • J. Kilian. A note on efficient zero-knowledge proofs and arguments. In 24'th STOC, pages 723-732, 1992.
    • (1992) 24'th STOC , pp. 723-732
    • Kilian, J.1
  • 20
    • 84969346266 scopus 로고
    • A certified digital signature
    • July; Santa-Barbara, California
    • R.C. Merkle. A certified digital signature. Proceedings on Advances in Cryptology, pages 218-238, July 1989, Santa-Barbara, California.
    • (1989) Proceedings on Advances in Cryptology , pp. 218-238
    • Merkle, R.C.1
  • 21
    • 0001859260 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • E. Brickell ed., Springer-Verlag
    • T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology - CRYPTO 92, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992.
    • (1992) Advances in Cryptology - CRYPTO 92, Lecture Notes in Computer Science , vol.740
    • Okamoto, T.1
  • 22
    • 0003602325 scopus 로고
    • The MD5 message-digest algorithm
    • RFC 1321, April
    • R. Rivest. The MD5 message-digest algorithm. RFC 1321, April 1992.
    • (1992)
    • Rivest, R.1
  • 23
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • Preliminary version in 35th FOCS, 1994
    • Silvio Micali. Computationally sound proofs. SICOMP, vol. 30(4), pages 1253-1298, 2000. Preliminary version in 35th FOCS, 1994.
    • (2000) SICOMP , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 24
    • 0344839013 scopus 로고    scopus 로고
    • Improving the exact security of digital signature schemes
    • S. Micali and L. Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, 15(1):1-18, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.1 , pp. 1-18
    • Micali, S.1    Reyzin, L.2
  • 25
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandom generators
    • M. Naor. Bit commitment using pseudorandom generators. Journal of Cryptology, Vol.4, pages 151-158, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 151-158
    • Naor, M.1
  • 26
    • 84974533327 scopus 로고    scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC 89.
    • STOC 89
    • Naor, M.1    Yung, M.2
  • 28
    • 0025152622 scopus 로고    scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • John Rompel. One-Way Functions are Necessary and Sufficient for Secure Signatures. STOC 1990 387-394.
    • STOC 1990 , pp. 387-394
    • Rompel, J.1
  • 29
    • 12344258539 scopus 로고    scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr. Efficient signature generation by smart cards. Journal of Cryptology 4(3):161-174.
    • Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.