메뉴 건너뛰기




Volumn 5299 LNCS, Issue , 2008, Pages 109-123

Digital signatures out of second-preimage resistant hash functions

Author keywords

Merkle signatures; Provable security; Second preimage resistance

Indexed keywords

AUTHENTICATION; HASH FUNCTIONS; QUANTUM CRYPTOGRAPHY;

EID: 56749169079     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88403-3_8     Document Type: Conference Paper
Times cited : (39)

References (15)
  • 1
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470-484. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 33646825997 scopus 로고    scopus 로고
    • Hash based digital signature schemes
    • Smart, N, ed, Cryptography and Coding 2005, Springer, Heidelberg
    • Dods, C., Smart, N., Stam, M.: Hash based digital signature schemes. In: Smart, N. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96-115. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3796 , pp. 96-115
    • Dods, C.1    Smart, N.2    Stam, M.3
  • 3
    • 38049067956 scopus 로고    scopus 로고
    • On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive
    • Report 2005/192
    • Garcia, L.C.C: On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive, Report 2005/192 (2005), http://eprint.iacr. org/
    • (2005)
    • Garcia, L.C.C.1
  • 4
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 5
    • 33749549095 scopus 로고    scopus 로고
    • Strengthening digital signatures via randomized hashing
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Halevi, S., Krawczyk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 41-59
    • Halevi, S.1    Krawczyk, H.2
  • 6
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one way function
    • Technical Report SRI-CSL-98, SRI International Computer Science Laboratory
    • Lamport, L.: Constructing digital signatures from a one way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (1979)
    • (1979)
    • Lamport, L.1
  • 7
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 8
    • 52949120899 scopus 로고    scopus 로고
    • One-time signatures revisited: Have they become practical. Cryptology ePrint Archive
    • Report 2005/442
    • Naor, D., Shenhav, A., Wool, A.: One-time signatures revisited: Have they become practical. Cryptology ePrint Archive, Report 2005/442 (2005), http://eprint.iacr.org/
    • (2005)
    • Naor, D.1    Shenhav, A.2    Wool, A.3
  • 9
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press, New York
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing - STOC 1989, pp. 33-43. ACM Press, New York (1989)
    • (1989) 21st Annual ACM Symposium on Theory of Computing , vol.STOC 1989 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 10
    • 35048855067 scopus 로고    scopus 로고
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
  • 11
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • ACM Press, New York
    • Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: ACM Conference on Computer and Communications Security - CSS 1999, pp. 93-100. ACM Press, New York (1999)
    • (1999) ACM Conference on Computer and Communications Security , vol.CSS 1999 , pp. 93-100
    • Rohatgi, P.1
  • 12
    • 84948968075 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 445-452
    • Shoup, V.1
  • 13
    • 35048813651 scopus 로고    scopus 로고
    • Merkle tree traversal in log space and time
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541-554. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 541-554
    • Szydlo, M.1
  • 14
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-I
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-I. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 15
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.