How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
From MaRDI portal
Publication:5385963
DOI10.1007/11967668_23zbMath1177.94191WikidataQ62559247 ScholiaQ62559247MaRDI QIDQ5385963
Huaxiong Wang, Josef Pieprzyk, Ron Steinfeld
Publication date: 17 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11967668_23
94A62: Authentication, digital signatures and secret sharing
Related Items
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, A Generic Construction for Universally-Convertible Undeniable Signatures, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions, Lattice-based signatures with tight adaptive corruptions and more, A characterization of chameleon hash functions and new, efficient designs, Generic security-amplifying methods of ordinary digital signatures, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, One-Time Signatures and Chameleon Hash Functions, General Construction of Chameleon All-But-One Trapdoor Functions, Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency, A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function