. Digital signature schemes based on a general one-way function without trapdoor offer two potential advantages over digital signature schemes based on trapdoor one-way functions such as the RSA system: higher efficiency and much more freedom in choosing a cryptographic function to base the security on. Such a scheme is characterized by a directed acyclic computation graph and an antichain in a certain partially ordered set defined by the graph. Several results on the achievable efficiency of such schemes are proved, where the efficiency of a scheme is defined as the ratio of the size of messages that can be signed and the number of one-way function evaluations needed for setting up the system. For instance, the maximal achievable efficienc...
This paper describes and compares a variety of algorithms for secure transmission of information via...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
Essentially all known one-time signature schemes can be described as special instances of a general ...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a general framework that converts certain types of linear collision-resistant hash functi...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
In a digital signature scheme with message recovery, rather than transmitting the message $m$ and it...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
We consider a one-time digital signature scheme recently proposed by Persichetti and show that a suc...
Abstract. One-time signatures (OTS) offer a viable alternative to public keybased digital signatures...
This paper describes and compares a variety of algorithms for secure transmission of information via...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
Essentially all known one-time signature schemes can be described as special instances of a general ...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a general framework that converts certain types of linear collision-resistant hash functi...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
In a digital signature scheme with message recovery, rather than transmitting the message $m$ and it...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
We consider a one-time digital signature scheme recently proposed by Persichetti and show that a suc...
Abstract. One-time signatures (OTS) offer a viable alternative to public keybased digital signatures...
This paper describes and compares a variety of algorithms for secure transmission of information via...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...