메뉴 건너뛰기




Volumn 4116 LNCS, Issue , 2006, Pages 34-48

Relations among security notions for undeniable signature schemes

Author keywords

Composite decision Diffie Hellman assumption; Factoring assumption; Security notions; Undeniable signature

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DECISION THEORY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;

EID: 33750022061     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11832072_3     Document Type: Conference Paper
Times cited : (8)

References (26)
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • LNCS 1462, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations among notions of security for public-key encryption schemes. Advances in Cryptology - CRYPTO '98, LNCS 1462, pp. 26-45, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 38149125785 scopus 로고    scopus 로고
    • The power of verification queries in message authentication and authenticated encryption
    • M. Bellare, O. Goldreich and A. Mityagin. The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive Report 2004/309. Available from http://eprint.iacr.org/2004/309.
    • Cryptology EPrint Archive Report , vol.2004 , Issue.309
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 4
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • LNCS 1070, Springer-Verlag
    • M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. Advances in Cryptology - EUROCRYPT' 96, LNCS 1070, pp. 399-416, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology - EUROCRYPT' 96 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84948967686 scopus 로고    scopus 로고
    • Confirmer signature schemes secure against adaptive adversaries
    • LNCS 1870, Springer-Verlag
    • J. Camenisch and M. Michels. Confirmer signature schemes secure against adaptive adversaries. Advances in Cryptology -EUROCRYPT '00, LNCS 1870, pp. 243-258, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology -EUROCRYPT '00 , pp. 243-258
    • Camenisch, J.1    Michels, M.2
  • 7
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • LNCS 473, Springer-Verlag
    • D. Chaum. Zero-knowledge undeniable signatures. Advances in Cryptology EUROCRYPT '90, LNCS 473, pp. 458-464, Springer-Verlag, 1990.
    • (1990) Advances in Cryptology EUROCRYPT '90 , pp. 458-464
    • Chaum, D.1
  • 8
    • 84948970342 scopus 로고
    • Designated confirmer signatures
    • LNCS 950, Springer-Verlag
    • D. Chaum. Designated confirmer signatures. Advances in Cryptology - EURO-CRYPT '94, LNCS 950, pp. 86-91, Springer-Verlag, 1995.
    • (1995) Advances in Cryptology - EURO-CRYPT '94 , pp. 86-91
    • Chaum, D.1
  • 11
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • LNCS 576, Springer-Verlag
    • D. Chaum, E. van Heijst and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. Advances in Cryptology CRYPTO '91, LNCS 576, pp. 470-484, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology CRYPTO '91 , pp. 470-484
    • Chaum, D.1    Van Heijst, E.2    Pfitzmann, B.3
  • 12
    • 84947933505 scopus 로고    scopus 로고
    • New convertible undeniable signature schemes
    • LNCS 1070, Springer-Verlag
    • I. Damgård and T. Pedersen. New convertible undeniable signature schemes. Advances in Cryptology - EUROCRYPT '96, LNCS 1070, pp. 372-386, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology - EUROCRYPT '96 , pp. 372-386
    • Damgård, I.1    Pedersen, T.2
  • 14
    • 35248865251 scopus 로고    scopus 로고
    • Invisibility and anonymity of undeniable and confirmer signatures
    • LNCS 2612, Springer Verlag
    • S. Galbraith and W. Mao. Invisibility and anonymity of undeniable and confirmer signatures. Topics in Cryptology - CT-RSA '03, LNCS 2612, pp. 80-97, Springer Verlag, 2003.
    • (2003) Topics in Cryptology - CT-RSA '03 , pp. 80-97
    • Galbraith, S.1    Mao, W.2
  • 15
    • 84944870499 scopus 로고    scopus 로고
    • RSA-based undeniable signatures for general moduli
    • LNCS 2271, Springer Verlag
    • S. Galbraith, W. Mao and K. G. Paterson. RSA-based undeniable signatures for general moduli. Topics in Cryptology -CT-RSA '02, LNCS 2271, pp. 200-217, Springer Verlag, 2002.
    • (2002) Topics in Cryptology -CT-RSA '02 , pp. 200-217
    • Galbraith, S.1    Mao, W.2    Paterson, K.G.3
  • 17
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • Springer-Verlag
    • O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, vol. 7, no. 1, pp. 1-32, Springer-Verlag, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 18
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Preliminary version in 17th STOC, 1985
    • S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, vol. 18, pp. 186-208, 1989 (Preliminary version in 17th STOC, 1985).
    • (1989) SIAM Journal on Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 19
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptative chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptative chosen-message attacks. SIAM Journal on Computing, vol. 17, no. 2, pp. 281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 21
    • 24944515454 scopus 로고    scopus 로고
    • 3-Move undeniable signature scheme
    • LNCS 3494, Springer-Verlag
    • K. Kurosawa and S.-H. Heng. 3-Move undeniable signature scheme. Advances in Cryptology -EUROCRYPT '05, LNCS 3494, pp. 181-197, Springer-Verlag, 2005.
    • (2005) Advances in Cryptology -EUROCRYPT '05 , pp. 181-197
    • Kurosawa, K.1    Heng, S.-H.2
  • 22
    • 0345869098 scopus 로고    scopus 로고
    • Efficient Rabin-type digital signature scheme
    • K. Kurosawa and W. Ogata. Efficient Rabin-type digital signature scheme. Design, Codes and Cryptography, vol. 16, no. 1, pp. 53-64, 1999.
    • (1999) Design, Codes and Cryptography , vol.16 , Issue.1 , pp. 53-64
    • Kurosawa, K.1    Ogata, W.2
  • 23
    • 35048866374 scopus 로고    scopus 로고
    • Identity based undeniable signatures
    • LNCS 2964, Springer-Verlag
    • B. Libert and J.-J Quisquater. Identity based undeniable signatures. Topics in Cryptology -CT-RSA '04, LNCS 2964, pp. 112-125, Springer-Verlag, 2004.
    • (2004) Topics in Cryptology -CT-RSA '04 , pp. 112-125
    • Libert, B.1    Quisquater, J.-J.2
  • 24
    • 33645600868 scopus 로고    scopus 로고
    • Undeniable signatures based on characters: How to sign with one bit
    • LNCS 2947, Springer-Verlag
    • J. Monnerat and S. Vaudenay. Undeniable signatures based on characters: how to sign with one bit. Public Key Cryptography -PKC '04, LNCS 2947, pp. 361-396, Springer-Verlag, 2004.
    • (2004) Public Key Cryptography -PKC '04 , pp. 361-396
    • Monnerat, J.1    Vaudenay, S.2
  • 25
    • 35048904095 scopus 로고    scopus 로고
    • Generic homomorphic undeniable signatures
    • LNCS 3329, Springer-Verlag
    • J. Monnerat and S. Vaudenay. Generic homomorphic undeniable signatures. Advances in Cryptology -Asiacrypt '04, LNCS 3329, pp. 354-371, Springer-Verlag, 2004.
    • (2004) Advances in Cryptology -Asiacrypt '04 , pp. 354-371
    • Monnerat, J.1    Vaudenay, S.2
  • 26
    • 24144448778 scopus 로고    scopus 로고
    • The security of the FDH variant of Chaum's undeniable scheme
    • LNCS 3386, Springer-Verlag
    • W. Ogata, K. Kurosawa and S.-H. Heng. The security of the FDH variant of Chaum's undeniable scheme. Public Key Cryptography - PKC '05, LNCS 3386, pp. 328-345, Springer-Verlag, 2005.
    • (2005) Public Key Cryptography - PKC '05 , pp. 328-345
    • Ogata, W.1    Kurosawa, K.2    Heng, S.-H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.