메뉴 건너뛰기




Volumn 1740, Issue , 1999, Pages 167-182

Improving the exact security of fiat-Shamir signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COST BENEFIT ANALYSIS; SECURITY SYSTEMS;

EID: 84961294848     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46701-7_15     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 79958074367 scopus 로고    scopus 로고
    • In Michael Wiener, editor, Springer-Verlag, 15-19 August, Revised version is available from
    • Mihir Bellare and Sara Miner. A forward-secure digital signature scheme. In Michael Wiener, editor, Advances in Cryptology—CRYPTO’99, volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, 15-19 August 1999. Revised version is available from http://www.cs.ucsd.edu/mihir/.
    • Advances in Cryptology—CRYPTO’99
    • Bellare, M.1    Miner, S.2
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical:A paradigm for designing efficient protocols
    • November, Revised version appears in
    • Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communication Security, November 1993. Revised version appears in http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html
    • (1993) Procee
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84961296798 scopus 로고    scopus 로고
    • Springer-Verlag
    • I. B. Damgard, editor. Advances in Cryptology—EUROCRYPT 90, volume 473 of Lecture Notes in Computer Science. Springer-Verlag, 1991, 21-24 May 1990.
    • Damgard, I.B.1
  • 5
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • Uriel Feige, Amos Fiat, and Adi Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77-94, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 7
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 8
    • 84969346237 scopus 로고    scopus 로고
    • Oded Goldreich. Two remarks concerning the Goldwasser-Micali-Rivest signature scheme. In Odlyzko [Odl86], pages 104-110.
    • Goldreich, O.1
  • 13
    • 33746441852 scopus 로고
    • Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March
    • Silvio Micali. A secure and efficient digital signature algorithm. Technical Report MIT/LCS/TM-501, Massachusetts Institute of Technology, Cambridge, MA, March 1994.
    • (1994) A Secure and Efficient Digital Signature Algorithm
    • Micali, S.1
  • 14
    • 85031775795 scopus 로고    scopus 로고
    • Silvio Micali and Adi Shamir. An improvement of the Fiat-Shamir identification and signature scheme. In Goldwasser [Gol88], pages 244-247.
    • Micali, S.1    Shamir, A.2
  • 16
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • In Ernest F. Brickell, editor, volume 740 of Lecture Notes in Computer Science, Springer-Verlag, 16-20 August 1992
    • Tatsuaki Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Ernest F. Brickell, editor, Advances in Cryptology—CRYPTO’92, volume 740 of Lecture Notes in Computer Science, pages 31-53. Springer-Verlag, 1993, 16-20 August 1992.
    • (1993) Advances in Cryptology—CRYPTO’92 , pp. 31-53
    • Okamoto, T.1
  • 17
    • 84961327170 scopus 로고    scopus 로고
    • Kazuo Ohta and Tatsuaki Okamoto. A modification of the Fiat-Shamir scheme. In Goldwasser [Gol88], pages 232-243.
    • Ohta, K.1    Okamoto, T.2
  • 18
    • 84957705622 scopus 로고    scopus 로고
    • On concrete security treatment of signatures derived from identification
    • Kazuo Ohta and Tatsuaki Okamoto. On concrete security treatment of signatures derived from identification. In Hugo Krawczyk, editor, Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 354-369. Springer-Verlag, 23-27 August 1998.
    • (1998) Advances in Cryptology—CRYPTO’98 , pp. 354-369
    • Ohta, K.1    Okamoto, T.2
  • 19
    • 33745972475 scopus 로고    scopus 로고
    • H. Ong and C. P. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In Damgard [Dam90], pages 432-440.
    • Ong, H.1    Schnorr, C.P.2
  • 20
    • 84961294188 scopus 로고    scopus 로고
    • David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Maurer [Mau96], pages 387-398.
    • Pointcheval, D.1    Stern, J.2
  • 22
    • 85032873931 scopus 로고    scopus 로고
    • C. P. Schnorr. Efficient identification and signatures for smart cards. In Quisquater and Vandewalle [QV89], pages 688-689.
    • Schnorr, C.P.1
  • 23
    • 84955587394 scopus 로고    scopus 로고
    • Security of 2*-root identification and signatures
    • In Neal Koblitz, editor, volume 1109 of Lecture Notes in Computer Science, Springer-Verlag, 18-22 August 1996
    • C. P. Schnorr. Security of 2*-root identification and signatures. In Neal Koblitz, editor, Advances in Cryptology—CRYPTO’96, volume 1109 of Lecture Notes in Computer Science, pages 143-156. Springer-Verlag, 18-22 August 1996.
    • volume 1109 of Lecture Notes in Computer Science , pp. 143-156
    • Schnorr, C.P.1
  • 24
    • 84961304830 scopus 로고    scopus 로고
    • Victor Shoup. On the security of a practical identification scheme. In Maurer [Mau96], pages 344-353.
    • Shoup, V.1
  • 25
    • 0019080452 scopus 로고
    • A modification of the RSA public-key encryption procedure
    • November
    • Hugh C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726-729, November 1980.
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.6 , pp. 726-729
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.