Security of signature schemes in a multi-user setting (Q702188): Difference between revisions
From MaRDI portal
Normalize DOI. |
Normalize DOI. |
||
Property / DOI | |||
Property / DOI: 10.1023/B:DESI.0000036250.18062.3F / rank | |||
Property / DOI | |||
Property / DOI: 10.1023/B:DESI.0000036250.18062.3F / rank | |||
Normal rank |
Latest revision as of 01:10, 10 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Security of signature schemes in a multi-user setting |
scientific article |
Statements
Security of signature schemes in a multi-user setting (English)
0 references
17 January 2005
0 references
Some special attacks on cryptographic primitives used in the so-called multi-user setting motivate the authors to consider the security of signature schemes in this more general setting. They present a security definition for signature schemes in the multi-user setting that accounts for key substitution attacks. They prove (Theorem 6) that any signature scheme that is secure in the single-user setting to one that is secure under the new definitions. The authors consider various signature schemes -- the Schnorr signature scheme, DSA, ECDSA and the Rabin-Williams signature scheme -- and prove that all they are secure in the multiuser setting under some constraints on the parameters (Theorems 7,8,9,11).
0 references
digital signature
0 references
provable security
0 references
multi-user signature schemes
0 references