메뉴 건너뛰기




Volumn 6597 LNCS, Issue , 2011, Pages 615-629

Impossibility of blind signatures from one-way permutations

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 79953224070     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19571-6_37     Document Type: Conference Paper
Times cited : (12)

References (26)
  • 1
    • 84945119655 scopus 로고    scopus 로고
    • A secure three-move blind signature scheme for polynomially many signatures
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Abe, M.: A secure three-move blind signature scheme for polynomially many signatures. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 136-151. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 136-151
    • Abe, M.1
  • 2
    • 77956996315 scopus 로고    scopus 로고
    • Structure-preserving signatures and commitments to group elements
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 209-236
    • Abe, M.1    Fuchsbauer, G.2    Groth, J.3    Haralambiev, K.4    Ohkubo, M.5
  • 3
    • 72449208074 scopus 로고    scopus 로고
    • A framework for universally composable non-committing blind signatures
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Abe, M., Ohkubo, M.: A framework for universally composable non-committing blind signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 435-450. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 435-450
    • Abe, M.1    Ohkubo, M.2
  • 5
    • 70350341688 scopus 로고    scopus 로고
    • 2)- query attack on any key exchange from a random oracle
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • 2)- query attack on any key exchange from a random oracle. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 374-390. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 374-390
    • Barak, B.1    Mahmoody-Ghidary, M.2
  • 6
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. Journal of Cryptology 16(3), 185-215 (2003)
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 7
    • 35248880074 scopus 로고    scopus 로고
    • Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31-46. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2567 , pp. 31-46
    • Boldyreva, A.1
  • 8
    • 23944509128 scopus 로고    scopus 로고
    • Efficient blind signatures without random oracles
    • Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
    • Camenisch, J.L., Koprowski, M., Warinschi, B.: Efficient blind signatures without random oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 134-148. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3352 , pp. 134-148
    • Camenisch, J.L.1    Koprowski, M.2    Warinschi, B.3
  • 9
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Camenisch, J.L., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.L.1    Neven, G.2    Shelat, A.3
  • 10
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum Press, New York
    • Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - Crypto 1982, pp. 199-203. Plenum Press, New York (1983)
    • (1983) Advances in Cryptology - Crypto 1982 , pp. 199-203
    • Chaum, D.1
  • 11
    • 81055135743 scopus 로고    scopus 로고
    • Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations
    • Report 2010/648
    • Fiore, D., Schröder, D.: Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations. Cryptology ePrint Archive, Report 2010/648 (2010), http://eprint.iacr.org/2010/ 648
    • (2010) Cryptology EPrint Archive
    • Fiore, D.1    Schröder, D.2
  • 12
    • 33749544519 scopus 로고    scopus 로고
    • Round-optimal composable blind signatures in the common reference string model
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Fischlin, M.: Round-optimal composable blind signatures in the common reference string model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 60-77
    • Fischlin, M.1
  • 13
    • 67049158194 scopus 로고    scopus 로고
    • Security of blind signatures under aborts
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Fischlin, M., Schröder, D.: Security of blind signatures under aborts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 297-316. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 297-316
    • Fischlin, M.1    Schröder, D.2
  • 14
    • 77954644602 scopus 로고    scopus 로고
    • On the impossibility of three-move blind signature schemes
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Fischlin, M., Schröder, D.: On the impossibility of three-move blind signature schemes. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 197-215. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 197-215
    • Fischlin, M.1    Schröder, D.2
  • 15
    • 38049020416 scopus 로고    scopus 로고
    • Concurrently-secure blind signatures without random oracles or setup assumptions
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hazay, C., Katz, J., Koo, C.-Y., Lindell, Y.: Concurrently-secure blind signatures without random oracles or setup assumptions. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 323-341. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 323-341
    • Hazay, C.1    Katz, J.2    Koo, C.-Y.3    Lindell, Y.4
  • 16
    • 38049159751 scopus 로고    scopus 로고
    • Universally-composable two-party computation in two rounds
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Horvitz, O., Katz, J.: Universally-composable two-party computation in two rounds. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 111-129. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 111-129
    • Horvitz, O.1    Katz, J.2
  • 19
    • 84958591696 scopus 로고    scopus 로고
    • Security of blind digital signatures
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 150-164
    • Juels, A.1    Luby, M.2    Ostrovsky, R.3
  • 20
    • 40249098611 scopus 로고    scopus 로고
    • Equivocal blind signatures and adaptive UC-security
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Kiayias, A., Zhou, H.-S.: Equivocal blind signatures and adaptive UC-security. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 340-355. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 340-355
    • Kiayias, A.1    Zhou, H.-S.2
  • 21
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press, New York
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 33-43. ACM Press, New York (1989)
    • (1989) 21st Annual ACM Symposium on Theory of Computing (STOC) , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 22
    • 33745554010 scopus 로고    scopus 로고
    • Efficient blind and partially blind signatures without random oracles
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 80-99
    • Okamoto, T.1
  • 23
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-396 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 24
    • 35048815001 scopus 로고    scopus 로고
    • Notions of reducibility between cryptographic primitives
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Reingold, O., Trevisan, L., Vadhan, S.P.: Notions of reducibility between cryptographic primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 1-20
    • Reingold, O.1    Trevisan, L.2    Vadhan, S.P.3
  • 25
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM Press, New York
    • Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: 22nd Annual ACM Symposium on Theory of Computing (STOC), pp. 387-394. ACM Press, New York (1990)
    • (1990) 22nd Annual ACM Symposium on Theory of Computing (STOC) , pp. 387-394
    • Rompel, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.