메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 1-12

A signature scheme with message recovery as secure as discrete logarithm

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; GEOMETRY; HASH FUNCTIONS; RECOVERY; SECURITY OF DATA;

EID: 84956857891     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 2
    • 84947906522 scopus 로고    scopus 로고
    • The Exact Security of Digital Signatures –How to Sign with RSA and Rabin
    • M. Bellare and P. Rogaway, “The Exact Security of Digital Signatures –How to Sign with RSA and Rabin,” Proc. of Eurocrypt’96, Springer-Verlag, LNCS, pp.399–416, 1996. 378, 379
    • (1996) Proc. Of Eurocrypt’96, Springer-Verlag, LNCS , Issue.378 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
    • D. Bleichenbacher, “Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1,” Proc. of Crypto’98, LNCS 1462, Springer-Verlag, pp. 1–12, 1998. 378
    • (1998) Proc. Of Crypto’98, LNCS 1462, Springer-Verlag , vol.112 , pp. 378
    • Bleichenbacher, D.1
  • 5
    • 84956859465 scopus 로고    scopus 로고
    • On the Security of RSA Padding
    • Springer-Verlag,LNCS
    • J.S., D. Naccache and J.P. Stern, “On the Security of RSA Padding,” Proc. of Crypto’99, Springer-Verlag, LNCS, 1999. 378
    • (1999) Proc. Of Crypto’99 , vol.378
    • Naccache, J.S.D.1    Stern, J.P.2
  • 6
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, IT-31, 4, pp.469– 472, 1985.
    • (1985) IEEE Transactions on Information Theory, IT-31, 4 , vol.4 , pp. 469-472
    • Elgamal, T.1
  • 7
    • 84990731886 scopus 로고    scopus 로고
    • How to Prove Yourself
    • Springer-Verlag, LNCS
    • A. Fiat and A. Shamir, “How to Prove Yourself,” Proc. of Crypto’86, Springer-Verlag, LNCS, pp.186–194.
    • Proc. Of Crypto’86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 8
    • 0024135240 scopus 로고
    • Zero-Knowledge Proofs of Identity
    • U. Feige, A. Fiat and A. Shamir, “Zero-Knowledge Proofs of Identity,” J. of Cryp-tology, 1, p.77–94, 1988. 385
    • (1988) J. Of Cryp-Tology, 1 , vol.385 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 9
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali and R. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM J. on Computing, 17, pp.281– 308, 1988. 379
    • (1988) SIAM J. On Computing, 17 , vol.379 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 10
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, 48, pp.203–209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 11
    • 84955571277 scopus 로고    scopus 로고
    • A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves
    • A. Miyaji, “A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves,” Proc. of Asiacrypt’96, Springer-Verlag, LNCS, pp. 1–14, 1996. 378, 379
    • (1996) Proc. Of Asiacrypt’96, Springer-Verlag, LNCS, Pp. , vol.378-379 , pp. 1-14
    • Miyaji, A.1
  • 12
    • 0024867751 scopus 로고
    • Universal One-Way Hash Functions and Their Cryptographic Applications
    • M. Naor and M. Yung, “Universal One-Way Hash Functions and Their Cryptographic Applications,” Proc. of STOC, pp.33–43, 1989.
    • (1989) Proc. Of STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 14
    • 84948973239 scopus 로고
    • Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
    • K. Nyberg and R.A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,” Proc. of Eurocrypt’94, Springer-Verlag, LNCS, pp.182–193, 1995. 378
    • (1995) Proc. Of Eurocrypt’94, Springer-Verlag, LNCS , vol.378 , pp. 182-193
    • Nyberg, K.1    Rueppel, R.A.2
  • 15
    • 0002670834 scopus 로고    scopus 로고
    • Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
    • K. Nyberg and R.A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,” Designs, Codes and Cryptography, 7, pp.61–81, 1996. 378
    • (1996) Designs, Codes and Cryptography, 7 , vol.378 , pp. 61-81
    • Nyberg, K.1    Rueppel, R.A.2
  • 16
    • 84957705622 scopus 로고    scopus 로고
    • On the Concrete Security Treatment of Signatures Derived from Identification
    • K. Ohta and T. Okamoto, “On the Concrete Security Treatment of Signatures Derived from Identification,” Proc. of Crypto’98, Springer-Verlag, LNCS, 1998. 381, 382, 383
    • (1998) Proc. Of Crypto’98, Springer-Verlag, LNCS , vol.381 , Issue.382
    • Ohta, K.1    Okamoto, T.2
  • 18
    • 0025152622 scopus 로고
    • One-Way Functions are Necessary and Sufficient for Secure Signature
    • J. Rompel, “One-Way Functions are Necessary and Sufficient for Secure Signature,” Proc. of STOC, pp.387–394, 1990.
    • (1990) Proc. Of STOC , pp. 387-394
    • Rompel, J.1
  • 19
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of ACM, 21, 2, pp.120-126, 1978.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.