DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Jin | ko |
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Chen, Xiaofeng | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.contributor.author | Wong, Duncan S. | ko |
dc.date.accessioned | 2013-03-12T15:38:43Z | - |
dc.date.available | 2013-03-12T15:38:43Z | - |
dc.date.created | 2012-07-03 | - |
dc.date.created | 2012-07-03 | - |
dc.date.issued | 2012-10 | - |
dc.identifier.citation | INFORMATION SCIENCES, v.201, pp.128 - 139 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | http://hdl.handle.net/10203/102754 | - |
dc.description.abstract | Digital signatures are one of the most fundamental primitives in cryptography. In this paper, three new paradigms are proposed to obtain signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), from any weakly-secure signature. These transformations are generic, simple, and provably secure in the standard model. In the first paradigm, based on a weakly-secure signature scheme, the construction of a fully-secure signature scheme requires one-time signature additionally. However, the other two are built only on weakly-secure signatures. To the best of our knowledge, it is observed for the first time in this paper that two weakly-secure signature schemes are sufficient to construct a fully-secure signature scheme. Based on the new proposed paradigms, several efficient instantiations without random oracles are also presented. We also show that these fully-secure signature schemes have many special interesting properties in application. (C) 2012 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | STRONGLY UNFORGEABLE SIGNATURES | - |
dc.subject | RANDOM ORACLES | - |
dc.subject | SCHEME | - |
dc.subject | CONSTRUCTION | - |
dc.subject | HELLMAN | - |
dc.subject | SHAMIR | - |
dc.subject | RABIN | - |
dc.subject | SIGN | - |
dc.title | Generic security-amplifying methods of ordinary digital signatures | - |
dc.type | Article | - |
dc.identifier.wosid | 000304335800010 | - |
dc.identifier.scopusid | 2-s2.0-84860297453 | - |
dc.type.rims | ART | - |
dc.citation.volume | 201 | - |
dc.citation.beginningpage | 128 | - |
dc.citation.endingpage | 139 | - |
dc.citation.publicationname | INFORMATION SCIENCES | - |
dc.identifier.doi | 10.1016/j.ins.2012.03.006 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Li, Jin | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.contributor.nonIdAuthor | Chen, Xiaofeng | - |
dc.contributor.nonIdAuthor | Wong, Duncan S. | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Signature | - |
dc.subject.keywordAuthor | Weak chosen message attack | - |
dc.subject.keywordAuthor | q-SDH assumption | - |
dc.subject.keywordAuthor | Strong-RSA assumption | - |
dc.subject.keywordAuthor | One-time signature | - |
dc.subject.keywordAuthor | Strong unforgeability | - |
dc.subject.keywordPlus | STRONGLY UNFORGEABLE SIGNATURES | - |
dc.subject.keywordPlus | RANDOM ORACLES | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | CONSTRUCTION | - |
dc.subject.keywordPlus | HELLMAN | - |
dc.subject.keywordPlus | SHAMIR | - |
dc.subject.keywordPlus | RABIN | - |
dc.subject.keywordPlus | SIGN | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.