In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. These signatures were originally proposed to provide information-theoretic-based security against forgeries. In contrast to classical signature schemes, in which signers are protected through a computational conjecture, fail-stop signature schemes protect the signers in an information theoretic sense, i.e., they guarantee that no one, regardless of its computational power, is able to forge a signature that cannot be detected and proven to be a forgery. Such a feature inherently introduced another threat: malicious signers who want to deny a legitimate signature. Many construction of fail-stop signatures were proposed in the literature, based on...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this paper, we present new blind signature schemes based on the factorization problem. They are t...
Security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signa...
AbstractFail-stop signature (FSS) schemes protect a signer against a forger with unlimited computati...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
In this study, a fail-stop group signature scheme (FSGSS) that combines the features of group and fa...
AbstractAt Crypto 96 Cramer and Damgård proposed an efficient, tree-based, signature scheme that is ...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
We describe an RSA-based signing scheme which combines essentially optimal efficiency with attractiv...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Digital signatures are often used by trusted authorities to make unique bindings between a subject a...
The focus of this note is the Goldwasser-Micali-Rivest Signature Scheme (presented in the 25th POCS,...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this paper, we present new blind signature schemes based on the factorization problem. They are t...
Security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signa...
AbstractFail-stop signature (FSS) schemes protect a signer against a forger with unlimited computati...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
In this study, a fail-stop group signature scheme (FSGSS) that combines the features of group and fa...
AbstractAt Crypto 96 Cramer and Damgård proposed an efficient, tree-based, signature scheme that is ...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
We describe an RSA-based signing scheme which combines essentially optimal efficiency with attractiv...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Digital signatures are often used by trusted authorities to make unique bindings between a subject a...
The focus of this note is the Goldwasser-Micali-Rivest Signature Scheme (presented in the 25th POCS,...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this paper, we present new blind signature schemes based on the factorization problem. They are t...