메뉴 건너뛰기




Volumn 4377 LNCS, Issue , 2007, Pages 31-48

Impossibility proofs for RSA signatures in the standard model

Author keywords

[No Author keywords available]

Indexed keywords

EQUIVALENCE CLASSES; HASH FUNCTIONS; NETWORK SECURITY;

EID: 78650717533     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11967668_3     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • M. Bellare, A. Boldyreva and A. Palacio. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In EUROCRYPT 2004, LNCS 3027, pp. 171–188, 2004.
    • (2004) EUROCRYPT 2004 , vol.LNCS 3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 2
    • 20544449100 scopus 로고    scopus 로고
    • The One-More-RSA-Inversion Problems and the security of Chaum’s Blind Signature Scheme
    • M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko. The One-More-RSA-Inversion Problems and the security of Chaum’s Blind Signature Scheme. Journal of Cryptology, Vol. 16, No. 3, 2003, pp. 185-215.
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, pp. 62–73, 1993. ACM Press.
    • (1993) ACM CCS , vol.93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 85025841649 scopus 로고    scopus 로고
    • Analysis of random oracle instantiation scenarios for OAEP and other practical schemes
    • A. Boldyreva and M. Fischlin. Analysis of random oracle instantiation scenarios for OAEP and other practical schemes. In CRYPTO 2005, LNCS 3493, pp. 412–429.
    • (2005) CRYPTO , vol.LNCS 3493 , pp. 412-429
    • Boldyreva, A.1    Fischlin, M.2
  • 6
    • 35048875340 scopus 로고    scopus 로고
    • On the random-oracle methodology as applied to length-restricted signature schemes
    • R. Canetti, O. Goldreich and S. Halevi. On the random-oracle methodology as applied to length-restricted signature schemes. In TCC 2004, LNCS 2951, pp. 40–57, 2004.
    • (2004) TCC 2004 , vol.LNCS 2951 , pp. 40-57
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 7
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • J-S. Coron. On the exact security of full domain hash. In CRYPTO 2000, LNCS 1880, pp. 229–235, 2000.
    • (2000) CRYPTO 2000 , vol.LNCS 1880 , pp. 229-235
    • Coron, J.-S.1
  • 8
    • 51849112650 scopus 로고    scopus 로고
    • On the generic insecurity of the full domain hash
    • Y. Dodis, R. Oliveira and K. Pietrzak. On the generic insecurity of the full domain hash. In CRYPTO 2005, LNCS 3493, pp. 449–466, 2005.
    • (2005) CRYPTO 2005 , vol.LNCS 3493 , pp. 449-466
    • Dodis, Y.1    Oliveira, R.2    Pietrzak, K.3
  • 9
    • 84978970262 scopus 로고
    • An efficient existentially unforgeable signature scheme and its applications
    • C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. In CRYPTO’94, LNCS 839, pp. 234–246,1994.
    • (1994) CRYPTO’94 , vol.LNCS 839 , pp. 234-246
    • Dwork, C.1    Naor, M.2
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO’86, LNCS 263, pp. 186–194, 1987.
    • (1987) CRYPTO’86 , vol.LNCS 263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Comp., 17(2):281–308, 1988.
    • (1988) SIAM Journal on Comp , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 13
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • J. B. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In CRYPTO 2002, LNCS 2442, pp. 111–126.
    • (2002) CRYPTO , vol.LNCS 2442 , pp. 111-126
    • Nielsen, J.B.1
  • 15
    • 33646784002 scopus 로고    scopus 로고
    • Discrete-log-based signatures may not be equivalent to discrete log
    • P. Paillier and D. Vergnaud. Discrete-log-based signatures may not be equivalent to discrete log. In ASIACRYPT 2005, LNCS 3788, pp. 1–20, 2005.
    • (2005) ASIACRYPT 2005 , vol.LNCS 3788 , pp. 1-20
    • Paillier, P.1    Vergnaud, D.2
  • 16
    • 77649259271 scopus 로고    scopus 로고
    • Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    • P. Paillier and J. Villar. Trading one-wayness against chosen-ciphertext security in factoring-based encryption. In ASIACRYPT 06, LNCS 4284, pp. 252–266, 2006.
    • (2006) ASIACRYPT 06 , vol.LNCS 4284 , pp. 252-266
    • Paillier, P.1    Villar, J.2
  • 17
    • 85025816431 scopus 로고    scopus 로고
    • RSA Data Security Inc., Sept
    • PKCS #1 v2.1: RSA cryptography standard (draft), document available at http://www.rsasecurity.com/rsalabs/pkcs/. RSA Data Security Inc., Sept. 2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.