메뉴 건너뛰기




Volumn 10957 LNCS, Issue , 2018, Pages 61-79

Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model)

Author keywords

[No Author keywords available]

Indexed keywords

CHROMIUM COMPOUNDS; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 85072870494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-58387-6_4     Document Type: Conference Paper
Times cited : (13)

References (17)
  • 1
    • 84964989351 scopus 로고    scopus 로고
    • On the impossibility of tight cryptographic reductions
    • Fischlin, M., Coron, J.-S. (eds.), pp., Springer, Heidelberg
    • Bader, C., Jager, T., Li, Y., Schäge, S.: On the impossibility of tight cryptographic reductions. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 273–304. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-510
    • (2016) EUROCRYPT 2016. LNCS , vol.9666 , pp. 273-304
    • Bader, C.1    Jager, T.2    Li, Y.3    Schäge, S.4
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.), pp., ACM Press, November
    • Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., Ashby, V. (eds.) Proceedings of CCS 1993, pp. 62–73. ACM Press, November 1993
    • (1993) Proceedings of CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0006578697 scopus 로고    scopus 로고
    • Certifying permutations: Non-interactive zero-knowledge based on any trapdoor permutation
    • Bellare, M., Yung, M.: Certifying permutations: non-interactive zero-knowledge based on any trapdoor permutation. J. Cryptol. 9(1), 149–166 (1996)
    • (1996) J. Cryptol. , vol.9 , Issue.1 , pp. 149-166
    • Bellare, M.1    Yung, M.2
  • 4
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Bellare, M. (ed.), pp., Springer, Heidelberg
    • Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6 14
    • (2000) CRYPTO 2000. LNCS , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 7
    • 84947215491 scopus 로고    scopus 로고
    • Optimal security proofs for PSS and other signature schemes
    • Knudsen, L.R. (ed.), pp., Springer, Heidelberg
    • Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272–287. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-718
    • (2002) EUROCRYPT 2002. LNCS , vol.2332 , pp. 272-287
    • Coron, J.-S.1
  • 8
    • 36749054167 scopus 로고    scopus 로고
    • Efficient signature schemes with tight reductions to the diffie-hellman problems
    • Goh, E.-J., Jarecki, S., Katz, J., Wang, N.: Efficient signature schemes with tight reductions to the diffie-hellman problems. J. Cryptol. 20(4), 493–514 (2007)
    • (2007) J. Cryptol. , vol.20 , Issue.4 , pp. 493-514
    • Goh, E.-J.1    Jarecki, S.2    Katz, J.3    Wang, N.4
  • 9
    • 85028470557 scopus 로고    scopus 로고
    • Optimal security reductions for unique signatures: Bypassing impossibilities with a counterexample
    • Katz, J., Shacham, H. (eds.), pp., Springer, Cham
    • Guo, F., Chen, R., Susilo, W., Lai, J., Yang, G., Mu, Y.: Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 517–547. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63715-018
    • (2017) CRYPTO 2017. LNCS , vol.10402 , pp. 517-547
    • Guo, F.1    Chen, R.2    Susilo, W.3    Lai, J.4    Yang, G.5    Mu, Y.6
  • 10
    • 84859959646 scopus 로고    scopus 로고
    • Optimal security proofs for full domain hash, revisited
    • Pointcheval, D., Johansson, T. (eds.), pp., Springer, Heidelberg
    • Kakvi, S.A., Kiltz, E.: Optimal security proofs for full domain hash, revisited. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 537–553. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-432
    • (2012) EUROCRYPT 2012. LNCS , vol.7237 , pp. 537-553
    • Kakvi, S.A.1    Kiltz, E.2
  • 11
    • 84871568449 scopus 로고    scopus 로고
    • Certifying RSA
    • Wang, X., Sako, K. (eds.), pp., Springer, Heidelberg
    • Kakvi, S.A., Kiltz, E., May, A.: Certifying RSA. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 404–414. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34961-425
    • (2012) ASIACRYPT 2012. LNCS , vol.7658 , pp. 404-414
    • Kakvi, S.A.1    Kiltz, E.2    May, A.3
  • 12
    • 35048877778 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor permutations
    • Cachin, C., Camenisch, J.L. (eds.), pp., Springer, Heidelberg
    • Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EURO-CRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-35
    • (2004) EURO-CRYPT 2004. LNCS , vol.3027 , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 14
    • 79951866706 scopus 로고    scopus 로고
    • Efficient sequential aggregate signed data
    • Neven, G.: Efficient sequential aggregate signed data. IEEE Trans. Inf. Theory 57(3), 1803–1815 (2011)
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.3 , pp. 1803-1815
    • Neven, G.1
  • 15
    • 3142543313 scopus 로고    scopus 로고
    • Determining strengths for public keys used for exchanging symmetric keys
    • April
    • Orman, H., Hoffman, P.: Determining strengths for public keys used for exchanging symmetric keys. RFC 3766, April 2004
    • (2004) RFC , vol.3766
    • Orman, H.1    Hoffman, P.2
  • 16
    • 85071767991 scopus 로고    scopus 로고
    • Making NSEC5 practical for DNSSEC. Cryptology ePrint Archive
    • Papadopoulos, D., et al.: Making NSEC5 practical for DNSSEC. Cryptology ePrint Archive, Report 2017/099 (2017). https://eprint.iacr.org/2017/099
    • (2017) Report 2017/099
    • Papadopoulos, D.1
  • 17
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. J. Cryptol. 17(4), 277–296 (2004)
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.