Generic security-amplifying methods of ordinary digital signatures
From MaRDI portal
Publication:712706
DOI10.1016/j.ins.2012.03.006zbMath1248.94107OpenAlexW2056570974WikidataQ115042085 ScholiaQ115042085MaRDI QIDQ712706
Xiaofeng Chen, Kwangjo Kim, Jin Li, Duncan S. Wong, Fangguo Zhang
Publication date: 17 October 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2012.03.006
signaturestrong unforgeabilityone-time signatureq-SDH assumptionstrong-RSA assumptionweak chosen message attack
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient certificateless proxy signature scheme with provable security
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
- Forward-secure identity-based signature: security notions and construction
- Efficient signature generation by smart cards
- Security arguments for digital signatures and blind signatures
- On-line/off-line digital signatures
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Short Signatures from Weaker Assumptions
- Generic Security-Amplifying Methods of Ordinary Digital Signatures
- A Generic Construction of Secure Signatures Without Random Oracles
- Generic Transformation to Strongly Unforgeable Signatures
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A method for obtaining digital signatures and public-key cryptosystems
- Secure Hash-and-Sign Signatures Without the Random Oracle
- How to sign given any trapdoor permutation
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
This page was built for publication: Generic security-amplifying methods of ordinary digital signatures