AbstractAt Crypto 96 Cramer and Damgård proposed an efficient, tree-based, signature scheme that is provably secure against adaptive chosen message attacks under the assumption that inverting RSA is computationally infeasible.In this paper we show how to modify their basic construction in order to achieve a scheme that is provably secure under the assumption that factoring large composites of a certain form is hard. Our scheme is as efficient as the original Cramer Damgård solution while relying on a seemingly weaker intractability assumption
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Abstract This paper considers strong-RSA signature schemes built from the scheme of Cramer and Shoup...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
We describe an RSA-based signing scheme which combines essentially optimal efficiency with attractiv...
We put forward a new technique to construct very efficient and compact signature schemes. Our techni...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
We present novel realizations of the transitive signature primitive introduced by Micali and Rivest ...
Abstract. In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA proble...
We present a practical selective forgery attack against RSA signatures with fixed-pattern padding sh...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Abstract This paper considers strong-RSA signature schemes built from the scheme of Cramer and Shoup...
A method is proposed for constructing from interactive protocols digital signature schemes secure ag...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. Th...
We describe an RSA-based signing scheme which combines essentially optimal efficiency with attractiv...
We put forward a new technique to construct very efficient and compact signature schemes. Our techni...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
We present novel realizations of the transitive signature primitive introduced by Micali and Rivest ...
Abstract. In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA proble...
We present a practical selective forgery attack against RSA signatures with fixed-pattern padding sh...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...