메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 93-107

Improved bounds on security reductions for discrete log based signatures

Author keywords

Provable security; Random oracle model; Schnorr signature scheme

Indexed keywords

CRYPTOGRAPHY; FORGING MACHINES; FORGINGS; STANDARDS;

EID: 51849109415     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_6     Document Type: Conference Paper
Times cited : (42)

References (21)
  • 1
    • 33646045378 scopus 로고    scopus 로고
    • Adao, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 374-396. Springer, Heidelberg (2005)
    • Adao, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
  • 2
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 3
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317-330. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35248822352 scopus 로고    scopus 로고
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 62-75. Springer, Heidelberg (2003)
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system, for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An efficient system, for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A practical cryptosystem provably secure under chosen ciphertext attack
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical cryptosystem provably secure under chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 0041713329 scopus 로고
    • Probabilistic methods in group theory II
    • Erdös, P., Hall, R.: Probabilistic methods in group theory II. Houston Math Journal 2, 173-180 (1976)
    • (1976) Houston Math Journal , vol.2 , pp. 173-180
    • Erdös, P.1    Hall, R.2
  • 11
    • 51849094729 scopus 로고    scopus 로고
    • On the (Im)Possibility of Key Dependent Encryption
    • Haitner, I., Holenstein, T.: On the (Im)Possibility of Key Dependent Encryption. Cryptology ePrint Archive (2008), http://eprint.iacr.org/2008/164
    • (2008) Cryptology ePrint Archive
    • Haitner, I.1    Holenstein, T.2
  • 14
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 15
    • 44449114656 scopus 로고    scopus 로고
    • Towards key-dependent message security in the standard mode
    • Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Hofheinz, D., Unruh, D.: Towards key-dependent message security in the standard mode. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 108-126. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 108-126
    • Hofheinz, D.1    Unruh, D.2
  • 16
    • 84974720881 scopus 로고    scopus 로고
    • Katz, J., Yung, M.: Unforgeable encryption and adaptively secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 284-299. Springer, Heidelberg (2001)
    • Katz, J., Yung, M.: Unforgeable encryption and adaptively secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284-299. Springer, Heidelberg (2001)
  • 17
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139
    • Krawczyk, H.1
  • 18
    • 35048855625 scopus 로고    scopus 로고
    • Sound computational interpretation of formal encryption with composed keys
    • Lim, J.-I, Lee, D.-H, eds, ICISC 2003, Springer, Heidelberg
    • Laud, P., Corin, R.: Sound computational interpretation of formal encryption with composed keys. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 55-66. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2971 , pp. 55-66
    • Laud, P.1    Corin, R.2
  • 19
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 20
    • 51849167546 scopus 로고    scopus 로고
    • Shacham, H.: A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. Cryptology ePrint Archive (2007) http://eprint.iacr.org/2007/074
    • Shacham, H.: A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. Cryptology ePrint Archive (2007) http://eprint.iacr.org/2007/074
  • 21
    • 84924015159 scopus 로고    scopus 로고
    • Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)
    • Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.