1997
DOI: 10.1137/s009753979324557x
|View full text |Cite
|
Sign up to set email alerts
|

Fail-Stop Signatures

Abstract: Fail-stop signatures can briefly be characterized as digital signatures that allow the signer to prove that a given forged signature is indeed a forgery. After such a proof has been published, the system can be stopped. This type of security is strictly stronger than that achievable with ordinary digital signatures as introduced by Diffie and Hellman in 1976 and formally defined by Goldwasser, Micali, and Rivest in 1988, which was widely regarded as the strongest possible definition. This paper formally define… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2000
2000
2011
2011

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 32 publications
(69 reference statements)
0
22
0
Order By: Relevance
“…Their signature scheme leads to short signatures, but the signing algorithm requires one exponentiation per bit of the message, which makes the resulting scheme inefficient. A number of works in the literature have studied the design of fail-stop signature schemes based on factoring-related assumptions [7,33,36,41,37]. However, almost all such constructions rely on assumptions that are stronger than the standard factoring assumption.…”
Section: Computementioning
confidence: 99%
See 1 more Smart Citation
“…Their signature scheme leads to short signatures, but the signing algorithm requires one exponentiation per bit of the message, which makes the resulting scheme inefficient. A number of works in the literature have studied the design of fail-stop signature schemes based on factoring-related assumptions [7,33,36,41,37]. However, almost all such constructions rely on assumptions that are stronger than the standard factoring assumption.…”
Section: Computementioning
confidence: 99%
“…However, almost all such constructions rely on assumptions that are stronger than the standard factoring assumption. The only exception is the construction of [7,33] which is based on the intractability of factoring integers n = pq for p, q with p = q = 3 mod 4 (i.e. Blum integers) and p = q mod 8.…”
Section: Computementioning
confidence: 99%
“…The verifier of the signature checks whether the signature corresponds to the multisignature of the group, by using the public key that all the members of the group share [19].…”
Section: A Multisignature Scheme Based On Sdlp and Ifpmentioning
confidence: 99%
“…To provide protection against forgeries of an attacker with unlimited computational power, fail-stop signature schemes are proposed [12], [16]. In the fail-stop signature scheme, in the case of forgery, the presumed signer can prove that a forgery has happened.…”
Section: Introductionmentioning
confidence: 99%