Escure Signature Schemes based on Interactive Protocols

作者: Ronald Cramer , Ivan Damgård

DOI: 10.1007/3-540-44750-4_24

关键词:

摘要: Given only an interactive protocol of a certain type as primitive, we can build (non-interactive) signature scheme that is secure in the strongest sense Goldwasser, Micali and Rivest (see [11]): not existentially forgeable under adaptively chosen message attacks. There are numerous examples primitives satisfy our conditions, e.g. Feige-Fiat-Shamir, Schnorr, Guillou-Quisquater, Okamoto Brickell-Mc.Curley ([9], [17], [12], [15], [3]).A main consequence efficient schemes now also be based on computationally difficult problems other than factoring [11]), such discrete logarithm problem.In fact, existence one-way group homomorphisms sufficient assumption to support construction. As demonstrate construction claw-free pairs trapdoor permutations, results viewed generalization [11].

参考文章(19)
Ernest F. Brickell, Kevin S. McCurley, An interactive identification scheme based on discrete logarithms and factoring theory and application of cryptographic techniques. ,vol. 5, pp. 29- 39 ,(1992) , 10.1007/3-540-46877-3_6
Ivan Bjerre Damgård, Collision free hash functions and public key signature schemes theory and application of cryptographic techniques. ,vol. 304, pp. 203- 216 ,(1987) , 10.1007/3-540-39118-5_19
Martín Abadi, Eric Allendert, Andrei Broder, Joan Feigenbaum, Lane A. Hemachandra, On Generating Solved Instances of Computational Problems international cryptology conference. pp. 297- 310 ,(1988) , 10.1007/0-387-34799-2_23
Oded Goldreich, Two remarks concerning the Goldwasser-Micali-Rivest signature scheme international cryptology conference. pp. 104- 110 ,(1987) , 10.1007/3-540-47721-7_8
Cynthia Dwork, Moni Naor, An Efficient Existentially Unforgeable Signature Scheme and its Applications international cryptology conference. pp. 234- 246 ,(1994) , 10.1007/3-540-48658-5_23
Jurjen N. E. Bos, David Chaum, Provably Unforgeable Signatures international cryptology conference. pp. 1- 14 ,(1992) , 10.1007/3-540-48071-4_1
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
Ronald J.F. Cramer, On shared randomness and the size of secure signatures Department of Computer Science [CS]. pp. 1- 20 ,(1995)
Ralph C. Merkle, A Digital Signature Based on a Conventional Encryption Function international cryptology conference. pp. 369- 378 ,(1987) , 10.1007/3-540-48184-2_32
Louis C. Guillou, Jean-Jacques Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory theory and application of cryptographic techniques. pp. 123- 128 ,(1988) , 10.1007/3-540-45961-8_11