The Exact Security of Digital Signatures-How to Sign with RSA and Rabin

From MaRDI portal
Publication:2876918

DOI10.1007/3-540-68339-9_34zbMath1304.94094OpenAlexW2162653919MaRDI QIDQ2876918

Mihir Bellare, Phillip Rogaway

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_34




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelPractical algorithm substitution attack on extractable signaturesHow to build an ideal cipher: the indifferentiability of the Feistel constructionSoK: how (not) to design and implement post-quantum cryptographyAnother Look at TightnessMQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureOn the security of RSA textbook signature scheme on Paillier ciphertextFast, Compact, and Expressive Attribute-Based EncryptionMemory-Tight Reductions for Practical Key Encapsulation MechanismsToward RSA-OAEP Without Random OraclesAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreProvable security analysis of FIDO2On the security loss of unique signaturesTightly secure signatures from lossy identification schemesPractical cryptanalysis of ISO 9796-2 and EMV signaturesPost-quantum key-blinding for authentication in anonymity networksMulti-use and unidirectional identity-based proxy re-encryption schemesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionOn the bit security of cryptographic primitivesThe wonderful world of global random oraclesConstructing parallel long-message signcryption scheme from trapdoor permutationSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageLogarithmic-size ring signatures with tight security from the DDH assumptionOptimal tightness for chain-based unique signaturesKey regeneration-free ciphertext-policy attribute-based encryption and its applicationShort signatures from Diffie-Hellman: realizing almost compact public keyOn the Security of Distributed Multiprime RSAFast rebalanced RSA signature scheme with typical prime generationIdentity based identification from algebraic coding theoryThe distributions of individual bits in the output of multiplicative operationsCliptography: Clipping the Power of Kleptographic AttacksFrom Identification to Signatures, Tightly: A Framework and Generic TransformsDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsHow to Generate and Use Universal SamplersMultiparty non-interactive key exchange and more from isogenies on elliptic curvesFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesOn tight security proofs for Schnorr signaturesTrapdoor Sanitizable Signatures and Their Application to Content ProtectionShort signatures without random oracles and the SDH assumption in bilinear groupsA public key cryptosystem based on three new provable problemsOn the Improvement of the BDF Attack on LSBS-RSAIdentity-based chameleon hashing and signatures without key exposureHow (not) to design strong-RSA signaturesProgrammable hash functions and their applicationsAsynchronous Multi-Party Computation with Quadratic CommunicationReflections on the security proofs of Boneh-Franklin identity-based encryption schemeSurnaming Schemes, Fast Verification, and Applications to SGX TechnologyCertificateless signature scheme with security enhanced in the standard modelSpeeding-up verification of digital signaturesDelegation of cryptographic servers for capture-resilient devicesSequential aggregate signatures with lazy verification from trapdoor permutationsGeneralized public-key cryptography with tight securityA provably secure short signature scheme based on discrete logarithmsSigncryption Schemes Based on the RSA ProblemApplications of SigncryptionFast, compact, and expressive attribute-based encryptionA Signature Scheme with Efficient Proof of ValidityOptimal security proofs for full domain hash. RevisitedSubversion-resilient signatures: definitions, constructions and applicationsA novel authenticated encryption scheme and its extensionNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemSigncryption schemes with insider security in an ideal permutation modelOn the security of RSA with primes sharing least-significant bitsA robust \((k,n)+1\) threshold proxy signature scheme based on factoringDesignated verifier proxy signature scheme without random oraclesFunctional encryption for cascade automataEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmSigncryption from randomness recoverable public key encryptionGeneric security-amplifying methods of ordinary digital signaturesProgrammable Hash Functions and Their ApplicationsHomomorphic Encryption and Signatures from Vector DecompositionPrivate set-intersection with common set-upConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesSecurity of Digital Signature Schemes in Weakened Random Oracle ModelsMulti-property Preserving Combiners for Hash FunctionsEfficient KEMs with Partial Message RecoveryEfficient Sequential Aggregate Signed DataA lattice-based signcryption scheme without random oraclesRSA Moduli with a Predetermined Portion: Techniques and ApplicationsCertificate-Based Generalized Ring Signcryption SchemeRobust multi-property combiners for hash functionsSalvaging Merkle-Damgård for Practical ApplicationsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Tight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signaturesClassical vs quantum random oraclesNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesSecurity of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher ModelIdentity-Based Deterministic Signature Scheme without Forking-LemmaOptimal Security Proofs for Signatures from Identification SchemesEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackIdentity-based signatures in standard modelDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesNew efficient and secure protocols for verifiable signature sharing and other applicationsGeneric groups, collision resistance, and ECDSAQuantifying the security cost of migrating protocols to practiceBetter concrete security for half-gates garbling (in the multi-instance setting)Public key signatures in the multi-user setting.Improving the exact security of digital signature schemesForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin