Subversion-Resilient Signatures: Definitions, Constructions and Applications

作者: Giuseppe Ateniese , Daniele Venturi , Bernardo Magri

DOI:

关键词: Computer securityDigital signatureSignature (logic)Identification (information)Symmetric-key algorithmKey (cryptography)Theoretical computer scienceCryptographyRing signatureStateful firewallMathematics

摘要: … The firewall we design allows us to successfully protect so-… signature schemes (which include unique signatures as a … signatures can be extracted efficiently from the signature itself; as …

参考文章(80)
Yvo Desmedt, Subliminal-free authentication and signature theory and application of cryptographic techniques. pp. 23- 33 ,(1988) , 10.1007/3-540-45961-8_3
Sven Schäge, Strong security from probabilistic signature schemes public key cryptography. pp. 84- 101 ,(2012) , 10.1007/978-3-642-30057-8_6
Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel, Signature Schemes Secure against Hard-to-Invert Leakage Advances in Cryptology – ASIACRYPT 2012. ,vol. 7658, pp. 98- 115 ,(2012) , 10.1007/978-3-642-34961-4_8
Hoeteck Wee, Public key encryption against related key attacks public key cryptography. pp. 262- 279 ,(2012) , 10.1007/978-3-642-30057-8_16
Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou, Locally Decodable and Updatable Non-malleable Codes and Their Applications Theory of Cryptography. pp. 427- 450 ,(2015) , 10.1007/978-3-662-46494-6_18
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel, Leakage-Resilient Signatures with Graceful Degradation public key cryptography. pp. 362- 379 ,(2014) , 10.1007/978-3-642-54631-0_21
Aggelos Kiayias, Yiannis Tselekounis, Tamper Resilient Circuits: The Adversary at the Gates international conference on the theory and application of cryptology and information security. pp. 161- 180 ,(2013) , 10.1007/978-3-642-42045-0_9
Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway, Security of Symmetric Encryption against Mass Surveillance international cryptology conference. ,vol. 2014, pp. 1- 19 ,(2014) , 10.1007/978-3-662-44371-2_1
Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth, On the Impossibility of Cryptography with Tamperable Randomness Advances in Cryptology – CRYPTO 2014. pp. 462- 479 ,(2014) , 10.1007/978-3-662-44371-2_26
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart, A Formal Treatment of Backdoored Pseudorandom Generators theory and application of cryptographic techniques. pp. 101- 126 ,(2015) , 10.1007/978-3-662-46800-5_5