Security arguments for digital signatures and blind signatures (Q1573771): Difference between revisions
From MaRDI portal
Created a new Item |
Created claim: DBLP publication ID (P1635): journals/joc/PointchevalS00, #quickstatements; #temporary_batch_1731530891435 |
||
(5 intermediate revisions by 5 users not shown) | |||
Property / describes a project that uses | |||
Property / describes a project that uses: HAVAL / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s001450010003 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2169194339 / rank | |||
Normal rank | |||
Property / Wikidata QID | |||
Property / Wikidata QID: Q56921502 / rank | |||
Normal rank | |||
Property / DBLP publication ID | |||
Property / DBLP publication ID: journals/joc/PointchevalS00 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 22:01, 13 November 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Security arguments for digital signatures and blind signatures |
scientific article |
Statements
Security arguments for digital signatures and blind signatures (English)
0 references
8 August 2000
0 references
This paper proves the security of a large class of signature schemes in the so-called random oracle model. This model assumes that the hash function used in a signature scheme behaves as a random function. However, it has been shown that there exist (contrived) schemes that are provably secure in the random oracle model, but not when used with a real hash function. So, as also stated by the authors of the paper: the paper offers security arguments for a large class of known signature schemes that includes for instance the Schnorr signature scheme and a slight variation of the well-known ElGamal signature scheme. The latter is particuarly interesting as, in spite of the existential forgery of the original scheme, the paper proves that the proposed variant resists existential forgeries even against an adaptively chosen-message attack, assuming the discrete logarithm problem is hard to solve. The paper furthermore studies the security of blind signatures. Such schemes are an important ingredient for anonymity in electronic cash systems. The paper also proposes new blind signature schemes and gives a security argument for it.
0 references
digital signature
0 references
blind signature
0 references
existential forgery
0 references
forking lemma
0 references
one-more forgery
0 references