Multiple-time signature schemes against adaptive chosen message attacks

被引:0
|
作者
Pieprzyk, J [1 ]
Wang, HX
Xing, CP
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, N Ryde, NSW, Australia
[2] Natl Univ Singapore, Dept Math, Singapore, Singapore
[3] Univ Sci & Technol China, Dept Math, Beijing, Peoples R China
来源
SELECTED AREAS IN CRYPTOGRAPHY | 2004年 / 3006卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.
引用
收藏
页码:88 / 100
页数:13
相关论文
共 50 条
  • [1] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [2] On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack
    Sakumoto, Koichi
    Shirai, Taizo
    Hiwatari, Harunaga
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 68 - 82
  • [3] Digital signature of multicast streams secure against adaptive chosen message attack
    Zhu, LH
    Cao, YD
    Wang, D
    COMPUTERS & SECURITY, 2004, 23 (03) : 229 - 240
  • [4] Adaptive Chosen-Message Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Standaert, Francois-Xavier
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 186 - 199
  • [5] Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
    Dou, Bennian
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1171 - 1172
  • [6] Symmetric steganography secure against chosen message and original cover attacks
    Jiang Nan
    Wang Jian
    Niu Xin-xin
    Yang Yi-xian
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 661 - +
  • [7] A Note on Fault Attacks Against Deterministic Signature Schemes
    Barenghi, Alessandro
    Pelosi, Gerardo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 182 - 192
  • [8] Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices
    Yavuz, Attila Altay
    Ozmen, Muslum Ozgur
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 215 - 227
  • [9] New digital signature scheme attaining immunity to adaptive chosen message attack
    Zhu, HF
    CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (04): : 484 - 486
  • [10] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +