Generic security-amplifying methods of ordinary digital signatures

Cited 6 time in webofscience Cited 0 time in scopus
  • Hit : 1031
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLi, Jinko
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorChen, Xiaofengko
dc.contributor.authorKim, Kwangjoko
dc.contributor.authorWong, Duncan S.ko
dc.date.accessioned2013-03-12T15:38:43Z-
dc.date.available2013-03-12T15:38:43Z-
dc.date.created2012-07-03-
dc.date.created2012-07-03-
dc.date.issued2012-10-
dc.identifier.citationINFORMATION SCIENCES, v.201, pp.128 - 139-
dc.identifier.issn0020-0255-
dc.identifier.urihttp://hdl.handle.net/10203/102754-
dc.description.abstractDigital signatures are one of the most fundamental primitives in cryptography. In this paper, three new paradigms are proposed to obtain signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), from any weakly-secure signature. These transformations are generic, simple, and provably secure in the standard model. In the first paradigm, based on a weakly-secure signature scheme, the construction of a fully-secure signature scheme requires one-time signature additionally. However, the other two are built only on weakly-secure signatures. To the best of our knowledge, it is observed for the first time in this paper that two weakly-secure signature schemes are sufficient to construct a fully-secure signature scheme. Based on the new proposed paradigms, several efficient instantiations without random oracles are also presented. We also show that these fully-secure signature schemes have many special interesting properties in application. (C) 2012 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectSTRONGLY UNFORGEABLE SIGNATURES-
dc.subjectRANDOM ORACLES-
dc.subjectSCHEME-
dc.subjectCONSTRUCTION-
dc.subjectHELLMAN-
dc.subjectSHAMIR-
dc.subjectRABIN-
dc.subjectSIGN-
dc.titleGeneric security-amplifying methods of ordinary digital signatures-
dc.typeArticle-
dc.identifier.wosid000304335800010-
dc.identifier.scopusid2-s2.0-84860297453-
dc.type.rimsART-
dc.citation.volume201-
dc.citation.beginningpage128-
dc.citation.endingpage139-
dc.citation.publicationnameINFORMATION SCIENCES-
dc.identifier.doi10.1016/j.ins.2012.03.006-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorLi, Jin-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.contributor.nonIdAuthorChen, Xiaofeng-
dc.contributor.nonIdAuthorWong, Duncan S.-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorSignature-
dc.subject.keywordAuthorWeak chosen message attack-
dc.subject.keywordAuthorq-SDH assumption-
dc.subject.keywordAuthorStrong-RSA assumption-
dc.subject.keywordAuthorOne-time signature-
dc.subject.keywordAuthorStrong unforgeability-
dc.subject.keywordPlusSTRONGLY UNFORGEABLE SIGNATURES-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusCONSTRUCTION-
dc.subject.keywordPlusHELLMAN-
dc.subject.keywordPlusSHAMIR-
dc.subject.keywordPlusRABIN-
dc.subject.keywordPlusSIGN-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0