2002
DOI: 10.1007/3-540-45664-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

Abstract: Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of users' secret information than a traditional digital signature. The focus of this paper is on methods for reducing memory requirements of unconditionally… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2002
2002
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…The models of Hanaoka et al [5,6] and Safavi-Naini et al [10] are based on security notions from message authentication codes (MACs). Hanaoka et al treat only a limited attack scenario (which is covered by our model), including impersonation, substitution, and transfer with a trap, and do not include a verification oracle.…”
Section: Comparison With Existing Modelsmentioning
confidence: 99%
See 3 more Smart Citations
“…The models of Hanaoka et al [5,6] and Safavi-Naini et al [10] are based on security notions from message authentication codes (MACs). Hanaoka et al treat only a limited attack scenario (which is covered by our model), including impersonation, substitution, and transfer with a trap, and do not include a verification oracle.…”
Section: Comparison With Existing Modelsmentioning
confidence: 99%
“…That is, it is important to distinguish between signatures that are created using a user's signing algorithm and signatures that may satisfy one or more user verification algorithms. Current research [5,6,10,12,7] has proposed various models for unconditionally secure signature schemes, but these models do not fully treat the implications of having multiple verification algorithms or analyze the need for (and trust questions associated with) having a dispute resolution mechanism. We address both of these issues in this paper.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…no anonymity. Though there are some unconditionally secure digital signature schemes [19,20,26] that do exist, these schemes yet too, do not provide anonymity. However, in computationally secure settings, anonymity can be achieved by using group signatures [11,8].…”
Section: Related Workmentioning
confidence: 99%