메뉴 건너뛰기




Volumn 6632 LNCS, Issue , 2011, Pages 189-206

Tight proofs for signature schemes without random oracles

Author keywords

SDH; signature class; SRSA; standard model; tight security

Indexed keywords

SDH; SIGNATURE CLASS; SRSA; STANDARD MODEL; TIGHT SECURITY;

EID: 79957981275     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-20465-4_12     Document Type: Conference Paper
Times cited : (38)

References (19)
  • 1
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic k-TAA
    • Prisco, R.D., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
    • Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: Prisco, R.D., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4116 , pp. 111-125
    • Au, M.H.1    Susilo, W.2    Mu, Y.3
  • 2
    • 44449163915 scopus 로고    scopus 로고
    • Proving tight security for rabin-williams signatures
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Bernstein, D.J.: Proving tight security for rabin-williams signatures. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 70-87. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 70-87
    • Bernstein, D.J.1
  • 3
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology 21(2), 149-177 (2008)
    • (2008) J. Cryptology , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 5
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M.K. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 6
    • 85008220662 scopus 로고    scopus 로고
    • A practical and tightly secure signature scheme without hash function
    • Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
    • Chevallier-Mames, B., Joye, M.: A practical and tightly secure signature scheme without hash function. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 339-356. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4377 , pp. 339-356
    • Chevallier-Mames, B.1    Joye, M.2
  • 7
    • 84948953220 scopus 로고    scopus 로고
    • Security analysis of the gennaro-halevi-rabin signature scheme
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Coron, J.S., Naccache, D.: Security analysis of the gennaro-halevi-rabin signature scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 91-101. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 91-101
    • Coron, J.S.1    Naccache, D.2
  • 8
    • 85024261619 scopus 로고    scopus 로고
    • Signature schemes based on the Strong RSA assumption
    • Cramer, R., Shoup, V.: Signature schemes based on the Strong RSA assumption. ACM Trans. Inf. Syst. Secur. 3(3), 161-185 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 9
    • 35248856345 scopus 로고    scopus 로고
    • The cramer-shoup strong-RSA Signature scheme revisited
    • Desmedt, Y. (ed.) PKC 2003. Springer, Heidelberg
    • Fischlin, M.: The cramer-shoup strong-RSA Signature scheme revisited. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 116-129. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 116-129
    • Fischlin, M.1
  • 10
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 12
    • 51849152334 scopus 로고    scopus 로고
    • Programmable hash functions and their applications
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 21-38. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 21-38
    • Hofheinz, D.1    Kiltz, E.2
  • 13
    • 84959444946 scopus 로고    scopus 로고
    • Chameleon signatures
    • The Internet Society, San Diego
    • Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS. The Internet Society, San Diego (2000)
    • (2000) NDSS
    • Krawczyk, H.1    Rabin, T.2
  • 14
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym systems
    • Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1758 , pp. 184-199
    • Lysyanskaya, A.1    Rivest, R.L.2    Sahai, A.3    Wolf, S.4
  • 15
    • 33745554010 scopus 로고    scopus 로고
    • Efficient blind and partially blind signatures without random oracles
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 80-99
    • Okamoto, T.1
  • 16
    • 0000981417 scopus 로고
    • Explicit bounds for some functions of prime numbers
    • Rosser, B.: Explicit bounds for some functions of prime numbers. American Journal of Mathematics 63(1), 211-232 (1941)
    • (1941) American Journal of Mathematics , vol.63 , Issue.1 , pp. 211-232
    • Rosser, B.1
  • 17
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 18
    • 0035475986 scopus 로고    scopus 로고
    • New digital signature scheme attaining immunity to adaptive-chosen message attack
    • Zhu, H.: New digital signature scheme attaining immunity to adaptive-chosen message attack. Chinese Journal of Electronics 10(4), 484-486 (2001)
    • (2001) Chinese Journal of Electronics , vol.10 , Issue.4 , pp. 484-486
    • Zhu, H.1
  • 19
    • 38049071972 scopus 로고    scopus 로고
    • A formal proof of Zhu's signature scheme
    • ePrint Archive, Report 2003/155
    • Zhu, H.: A formal proof of Zhu's signature scheme. Cryptology ePrint Archive, Report 2003/155 (2003), http://eprint.iacr.org/
    • (2003) Cryptology
    • Zhu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.