메뉴 건너뛰기




Volumn 3, Issue 1, 2009, Pages 69-87

Hash function requirements for Schnorr signatures

Author keywords

Generic group model; Hash function; Schnorr signatures

Indexed keywords


EID: 80053498671     PISSN: 18622976     EISSN: 18622984     Source Type: Journal    
DOI: 10.1515/JMC.2009.004     Document Type: Article
Times cited : (45)

References (35)
  • 1
    • 84947283407 scopus 로고    scopus 로고
    • From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. Advances in cryptology - EUROCRYPT 2002
    • Lars R. Knudsen, ed. Springer-Verlag, Berlin, Germany, Amsterdam, The Netherlands, April 28- May 2
    • Michel Abdalla, Jee Hea An, Mihir Bellare, and Chanathip Namprempre, From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. Advances in Cryptology - EUROCRYPT 2002 (Lars R. Knudsen, ed.), Lecture Notes in Computer Science 2332, pp. 418-433. Springer-Verlag, Berlin, Germany, Amsterdam, The Netherlands, April 28- May 2, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 418-433
    • Abdalla, M.1    Hea An, J.2    Bellare, M.3    Namprempre, C.4
  • 2
    • 38149094108 scopus 로고    scopus 로고
    • Seven-property-preserving iterated hashing: ROX. Advances in cryptology - ASIACRYPT 2007
    • Kaoru Kurosawa, ed. Springer-Verlag, Berlin, Germany, Kuching, Malaysia, December 2-6
    • Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton, Seven-Property-Preserving Iterated Hashing: ROX. Advances in Cryptology - ASIACRYPT 2007 (Kaoru Kurosawa, ed.), Lecture Notes in Computer Science 4833, pp. 130-146. Springer-Verlag, Berlin, Germany, Kuching, Malaysia, December 2-6, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4833 , pp. 130-146
    • Andreeva, E.1    Neven, G.2    Preneel, B.3    Shrimpton, T.4
  • 3
    • 34547339273 scopus 로고    scopus 로고
    • Multi-signatures in the plain public-Key model and a general forking lemma
    • DOI 10.1145/1180405.1180453, 1180453, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Mihir Bellare and Gregory Neven, Multi-signatures in the plain public-key model and a general forking lemma. ACM CCS 06: 13th Conference on Computer and Communications Secu-rity(Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), pp. 390-399. ACM Press, Alexandria, Virginia, USA, October 30- November 3, 2006. (Pubitemid 47131386)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 390-399
    • Bellare, M.1    Neven, G.2
  • 4
    • 38149004817 scopus 로고    scopus 로고
    • Hash functions in the dedicated-key setting: Design choices and MPP transforms. ICALP 2007: 34th international colloquium on automata, languages and programming
    • Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, eds. SpringerVerlag, Berlin, Germany, Wroclaw, Poland, July 9-13
    • Mihir Bellare and Thomas Ristenpart, Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. ICALP 2007: 34th International Colloquium on Automata, Languages and Programming(Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, eds.), Lecture Notes in Computer Science 4596, pp. 399-410. SpringerVerlag, Berlin, Germany, Wroclaw, Poland, July 9-13, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4596 , pp. 399-410
    • Bellare, M.1    Ristenpart, T.2
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • V. Ashby, ed. ACM Press, Fairfax, Virginia, USA, November 3-5
    • Mihir Bellare and Phillip Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. ACM CCS 93: 1st Conference on Computer and Communications Secu-rity(V. Ashby, ed.), pp. 62-73. ACM Press, Fairfax, Virginia, USA, November 3-5, 1993.
    • (1993) ACM CCS 93: 1st Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Advances in Cryptology - CRYPTO '97
    • -, Collision-Resistant Hashing: Towards Making UOWHFs Practical. Advances in Cryptology - CRYPTO'97 (Burton S. Kaliski Jr., ed.), Lecture Notes in Computer Science 1294, pp. 470-484. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 17-21, 1997. (Pubitemid 127112573)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84957808681 scopus 로고    scopus 로고
    • Design validations for discrete logarithm based signature schemes. PKC 2000: 3rd international workshop on theory and practice in public key cryptography
    • Hideki Imai and Yuliang Zheng, eds. Springer-Verlag, Berlin, Germany, Melbourne, Victoria, Australia, January 18-20
    • Ernest F. Brickell, David Pointcheval, Serge Vaudenay, and Moti Yung, Design Validations for Discrete Logarithm Based Signature Schemes. PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography(Hideki Imai and Yuliang Zheng, eds.), Lecture Notes in Computer Science 1751, pp. 276-292. Springer-Verlag, Berlin, Germany, Melbourne, Victoria, Australia, January 18-20, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 276-292
    • Brickell, E.F.1    Pointcheval, D.2    Vaudenay, S.3    Yung, M.4
  • 9
    • 84857769616 scopus 로고    scopus 로고
    • On the provable security of ECDSA
    • Cambridge University Press
    • -, On the Provable Security of ECDSA. Advances in Elliptic Curve Cryptography, pp. 21-40. Cambridge University Press, 2005.
    • (2005) Advances in Elliptic Curve Cryptography , pp. 21-40
    • Brown, D.R.L.1
  • 11
    • 84981199109 scopus 로고
    • A design principle for hash functions. advances in cryptology - CRYPTO'89
    • Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
    • Ivan Damgård, A Design Principle for Hash Functions. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 416-427. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 416-427
    • Damgård, I.1
  • 12
    • 84958745695 scopus 로고    scopus 로고
    • Adapting the weaknesses of the random oracle model to the generic group model. Advances in cryptology - ASIACRYPT 2002
    • Yuliang Zheng, ed. Springer-Verlag, Berlin, Germany, Queen-stown, New Zealand, December 1-5
    • Alexander W. Dent, Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. Advances in Cryptology - ASIACRYPT 2002 (Yuliang Zheng, ed.), Lecture Notes in Computer Science 2501, pp. 100-109. Springer-Verlag, Berlin, Germany, Queen-stown, New Zealand, December 1-5, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 100-109
    • Dent, A.W.1
  • 13
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems. Advances in cryptology - CRYPTO'86
    • Andrew M. Odlyzko, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August
    • Amos Fiat and Adi Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Advances in Cryptology - CRYPTO'86 (Andrew M. Odlyzko, ed.), Lecture Notes in Computer Science 263, pp. 186-194. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 14
    • 84858653957 scopus 로고    scopus 로고
    • A note on security proofs in the generic model. Advances in cryptology - ASI-ACRYPT 2000
    • Tatsuaki Okamoto, ed. Springer-Verlag, Berlin, Germany, Kyoto, Japan, December 3-7
    • Marc Fischlin, A Note on Security Proofs in the Generic Model. Advances in Cryptology - ASI-ACRYPT 2000 (Tatsuaki Okamoto, ed.), Lecture Notes in Computer Science 1976, pp. 458-469. Springer-Verlag, Berlin, Germany, Kyoto, Japan, December 3-7, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 458-469
    • Fischlin, M.1
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks, SIAM Journal on Computing 17 (1988), pp. 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 19
    • 33846856917 scopus 로고    scopus 로고
    • Another look at "provable security"
    • Neal Koblitz and Alfred J. Menezes, Another Look at "Provable Security", Journal of Cryp-tology 20 (2007), pp. 3-37.
    • (2007) Journal of Cryptology , vol.20 , pp. 3-37
    • Koblitz, N.1    Menezes, A.J.2
  • 21
    • 84957697337 scopus 로고    scopus 로고
    • Lower bounds on generic algorithms in groups
    • Advances in Cryptology - EUROCRYPT '98
    • Ueli M. Maurer and Stefan Wolf, Lower Bounds on Generic Algorithms in Groups. Advances in Cryptology - EUROCRYPT'98 (Kaisa Nyberg, ed.), Lecture Notes in Computer Science 1403, pp. 72-84. Springer-Verlag, Berlin, Germany, Espoo, Finland, May 31- June 4, 1998. (Pubitemid 128081477)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 72-84
    • Maurer, U.1    Wolf, S.2
  • 22
    • 84937461306 scopus 로고
    • One way hash functions and DES. Advances in cryptology - CRYPTO'89
    • Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
    • Ralph C. Merkle, One Way Hash Functions and DES. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 428-446. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 23
    • 84945124866 scopus 로고    scopus 로고
    • Hash functions: From Merkle-Damgård to shoup. Advances in cryptology - EUROCRYPT 2001
    • Birgit Pfitzmann, ed. Springer-Verlag, Berlin, Germany, Innsbruck, Austria, May 6-10
    • Ilya Mironov, Hash Functions: From Merkle-Damgård to Shoup. Advances in Cryptology - EUROCRYPT 2001 (Birgit Pfitzmann, ed.), Lecture Notes in Computer Science 2045, pp. 166-181. Springer-Verlag, Berlin, Germany, Innsbruck, Austria, May 6-10, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 166-181
    • Mironov, I.1
  • 24
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press, Seattle, Washington, USA, May 15-17
    • Moni Naor and Moti Yung, Universal one-way hash functions and their cryptographic applications. 21st Annual ACM Symposium on Theory of Computing, pp. 33-43. ACM Press, Seattle, Washington, USA, May 15-17, 1989.
    • (1989) 21st Annual ACM Symposium on Theory of Computing , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 26
    • 84957705622 scopus 로고    scopus 로고
    • On concrete security treatment of signatures derived from identification
    • Advances in Cryptology - CRYPTO '98
    • Kazuo Ohta and Tatsuaki Okamoto, On Concrete Security Treatment of Signatures Derived from Identification. Advances in Cryptology - CRYPTO'98 (Hugo Krawczyk, ed.), Lecture Notes in Computer Science 1462, pp. 354-369. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 23-27, 1998. (Pubitemid 128119018)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 354-369
    • Ohta, K.1    Okamoto, T.2
  • 28
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • David Pointcheval and Jacques Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology 13 (2000), pp. 361-396.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 29
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Fast software encryption - FSE 2004
    • Bimal K. Roy and Willi Meier, eds.) Springer-Verlag, Berlin, Germany, New Delhi, India, February 5-7
    • Phillip Rogaway and Thomas Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption - FSE 2004 (Bimal K. Roy and Willi Meier, eds.), Lecture Notes in Computer Science 3017, pp. 371-388. Springer-Verlag, Berlin, Germany, New Delhi, India, February 5-7, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 30
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards. Advances in cryptology - CRYPTO'89
    • Gilles Brassard, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24
    • Claus-Peter Schnorr, Efficient Identification and Signatures for Smart Cards. Advances in Cryptology - CRYPTO'89 (Gilles Brassard, ed.), Lecture Notes in Computer Science 435, pp. 239-252. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 20-24, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 239-252
    • Schnorr, C.1
  • 31
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • -, Efficient Signature Generation by Smart Cards, Journal of Cryptology 4 (1991), pp. 161-174.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.1
  • 32
    • 0000164225 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Advances in Cryptology - Eurocrypt '97
    • Victor Shoup, Lower Bounds for Discrete Logarithms and Related Problems. Advances in Cryptology - EUROCRYPT'97 (Walter Fumy, ed.), Lecture Notes in Computer Science 1233, pp. 256-266. Springer-Verlag, Berlin, Germany, Konstanz, Germany, May 11-15, 1997. (Pubitemid 127067806)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 256-266
    • Shoup, V.1
  • 33
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in applying proof methodologies to signature schemes. Advances in cryptology - CRYPTO 2002
    • Moti Yung, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 18-22
    • Jacques Stern, David Pointcheval, John Malone-Lee, and Nigel P. Smart, Flaws in Applying Proof Methodologies to Signature Schemes. Advances in Cryptology - CRYPTO 2002 (Moti Yung, ed.), Lecture Notes in Computer Science 2442, pp. 93-110. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 18-22, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 93-110
    • Stern, J.1    Pointcheval, D.2    Malone-Lee, J.3    Smart, N.P.4
  • 34
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1. Advances in cryptology - CRYPTO 2005
    • Victor Shoup, ed. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 14-18
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, Finding Collisions in the Full SHA-1. Advances in Cryptology - CRYPTO 2005 (Victor Shoup, ed.), Lecture Notes in Computer Science 3621, pp. 17-36. Springer-Verlag, Berlin, Germany, Santa Barbara, CA, USA, August 14-18, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Lisa Yin, Y.2    Yu, H.3
  • 35
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Xiaoyun Wang and Hongbo Yu, How to Break MD5 and Other Hash Functions. Advances in Cryptology - EUROCRYPT 2005 (Ronald Cramer, ed.), Lecture Notes in Computer Science 3494, pp. 19-35. Springer-Verlag, Berlin, Germany, Aarhus, Denmark, May 22-26, 2005. (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.