Security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a forger with unlimited computational power by enabling the sender to provide a proof of forger, if it occurs. In this paper, we give an efficient fail-stop signature scheme that uses two hard problems, discrete logarithm and factorisation , as the basis of receiver\u27s security. We show that the scheme has provable security against adaptively chosen message attack and is the most efficient scheme with respect to the ratio of the message length to the signature length. The scheme provides an efficient solution to signing messages up to 1881 bits
International audienceIn this paper we present three digital signature schemes with tight security r...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...
AbstractFail-stop signature (FSS) schemes protect a signer against a forger with unlimited computati...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
In this study, a fail-stop group signature scheme (FSGSS) that combines the features of group and fa...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
International audienceIn this paper we present three digital signature schemes with tight security r...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...
AbstractFail-stop signature (FSS) schemes protect a signer against a forger with unlimited computati...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
In an electronic world, a person can electronically sign a document such that the signature is verif...
The Snowden\u27s revelations kick-started a community-wide effort to develop cryptographic tools aga...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
In this study, a fail-stop group signature scheme (FSGSS) that combines the features of group and fa...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In a digital signature scheme with message recovery, rather than transmitting the message m and its ...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
International audienceIn this paper we present three digital signature schemes with tight security r...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...