Security of signature schemes in a multi-user setting (Q702188): Difference between revisions

From MaRDI portal
Normalize DOI.
Import241208061232 (talk | contribs)
Normalize DOI.
 
Property / DOI
 
Property / DOI: 10.1023/B:DESI.0000036250.18062.3F / rank
Normal rank
 
Property / DOI
 
Property / DOI: 10.1023/B:DESI.0000036250.18062.3F / rank
 
Normal rank

Latest revision as of 01:10, 10 December 2024

scientific article
Language Label Description Also known as
English
Security of signature schemes in a multi-user setting
scientific article

    Statements

    Security of signature schemes in a multi-user setting (English)
    0 references
    17 January 2005
    0 references
    Some special attacks on cryptographic primitives used in the so-called multi-user setting motivate the authors to consider the security of signature schemes in this more general setting. They present a security definition for signature schemes in the multi-user setting that accounts for key substitution attacks. They prove (Theorem 6) that any signature scheme that is secure in the single-user setting to one that is secure under the new definitions. The authors consider various signature schemes -- the Schnorr signature scheme, DSA, ECDSA and the Rabin-Williams signature scheme -- and prove that all they are secure in the multiuser setting under some constraints on the parameters (Theorems 7,8,9,11).
    0 references
    digital signature
    0 references
    provable security
    0 references
    multi-user signature schemes
    0 references
    0 references
    0 references

    Identifiers