Security arguments for digital signatures and blind signatures (Q1573771): Difference between revisions

From MaRDI portal
Changed an Item
Created claim: DBLP publication ID (P1635): journals/joc/PointchevalS00, #quickstatements; #temporary_batch_1731530891435
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s001450010003 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2169194339 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q56921502 / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/joc/PointchevalS00 / rank
 
Normal rank

Latest revision as of 22:01, 13 November 2024

scientific article
Language Label Description Also known as
English
Security arguments for digital signatures and blind signatures
scientific article

    Statements

    Security arguments for digital signatures and blind signatures (English)
    0 references
    0 references
    0 references
    8 August 2000
    0 references
    This paper proves the security of a large class of signature schemes in the so-called random oracle model. This model assumes that the hash function used in a signature scheme behaves as a random function. However, it has been shown that there exist (contrived) schemes that are provably secure in the random oracle model, but not when used with a real hash function. So, as also stated by the authors of the paper: the paper offers security arguments for a large class of known signature schemes that includes for instance the Schnorr signature scheme and a slight variation of the well-known ElGamal signature scheme. The latter is particuarly interesting as, in spite of the existential forgery of the original scheme, the paper proves that the proposed variant resists existential forgeries even against an adaptively chosen-message attack, assuming the discrete logarithm problem is hard to solve. The paper furthermore studies the security of blind signatures. Such schemes are an important ingredient for anonymity in electronic cash systems. The paper also proposes new blind signature schemes and gives a security argument for it.
    0 references
    0 references
    digital signature
    0 references
    blind signature
    0 references
    existential forgery
    0 references
    forking lemma
    0 references
    one-more forgery
    0 references

    Identifiers