A New Forward-Secure Digital Signature Scheme

作者: Michel Abdalla , Leonid Reyzin

DOI: 10.1007/3-540-44448-3_10

关键词: AlgorithmTheoretical computer scienceRandom oracleForward secrecyDigital signatureSignature (logic)Public-key cryptographySchnorr signatureComputer scienceConcrete securityCommunication complexity

摘要: We improve the Bellare-Miner (Crypto '99) construction of signature schemes with forward security in random oracle model. Our scheme has significantly shorter keys and is, therefore, more practical. By using a direct proof technique not used for forward-secure before, we are able to provide better bounds original as well our scheme. Bellare Miner also presented method constructing such without use oracle. conclude by proposing an improvement their additional, new accomplishing this.

参考文章(19)
Mihir Bellare, Sara K. Miner, A Forward-Secure Digital Signature Scheme international cryptology conference. pp. 431- 448 ,(1999) , 10.1007/3-540-48405-1_28
Oded Goldreich, Two remarks concerning the Goldwasser-Micali-Rivest signature scheme international cryptology conference. pp. 104- 110 ,(1987) , 10.1007/3-540-47721-7_8
Ronald Cramer, Ivan Damgård, Escure Signature Schemes based on Interactive Protocols international cryptology conference. pp. 297- 310 ,(1995) , 10.1007/3-540-44750-4_24
Silvio Micali, Leonid Reyzin, Improving the Exact Security of Fiat-Shamir Signature Schemes Lecture Notes in Computer Science. pp. 167- 182 ,(1999) , 10.1007/3-540-46701-7_15
Chae Hoon Lim, Pil Joong Lee, More Flexible Exponentiation with Precomputation international cryptology conference. pp. 95- 107 ,(1994) , 10.1007/3-540-48658-5_11
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Louis C. Guillou, Jean-Jacques Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory theory and application of cryptographic techniques. pp. 123- 128 ,(1988) , 10.1007/3-540-45961-8_11
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891
Shimon Even, Oded Goldreich, Silvio Micali, On-line/off-line digital signatures Journal of Cryptology. ,vol. 9, pp. 35- 67 ,(1996) , 10.1007/BF02254791
Mihir Bellare, Phillip Rogaway, Random oracles are practical: a paradigm for designing efficient protocols computer and communications security. pp. 62- 73 ,(1993) , 10.1145/168588.168596