2002
DOI: 10.1007/3-540-46035-7_29
|View full text |Cite
|
Sign up to set email alerts
|

Security Notions for Unconditionally Secure Signature Schemes

Abstract: Abstract. This paper focuses on notions for the security of digital signature schemes whose resistance against forgery is not dependent on unproven computational assumptions. We establish successfully a sound and strong notion for such signature schemes. We arrive at the sound notion by examining carefully the more established security notions for digital signatures based on public-key cryptography, and taking into account desirable requirements of signature schemes in the unconditional security setting. We al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
43
0

Year Published

2002
2002
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(44 citation statements)
references
References 30 publications
1
43
0
Order By: Relevance
“…For instance, recent work [18,27,29] generalizes Multi-Receiver Authentication (MRA) codes (invented by Desmedt et al [11]) to unconditionally-secure polynomial codes that satisfy similar properties to Transferability. These constructions are called MRA 3 codes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, recent work [18,27,29] generalizes Multi-Receiver Authentication (MRA) codes (invented by Desmedt et al [11]) to unconditionally-secure polynomial codes that satisfy similar properties to Transferability. These constructions are called MRA 3 codes.…”
Section: Related Workmentioning
confidence: 99%
“…However, none of that work or its successors (e.g., [18,19,24,27,29]) satisfies fully adaptive security-that unforgeability holds even with respect to an adversary that can see an a priori unbounded number of signatures on messages of its choice. In modern network environments, supporting adaptive security is important.…”
Section: Introductionmentioning
confidence: 99%
“…no anonymity. Though there are some unconditionally secure digital signature schemes [19,20,26] that do exist, these schemes yet too, do not provide anonymity. However, in computationally secure settings, anonymity can be achieved by using group signatures [11,8].…”
Section: Related Workmentioning
confidence: 99%
“…That is, it is important to distinguish between signatures that are created using a user's signing algorithm and signatures that may satisfy one or more user verification algorithms. Current research [5,6,10,12,7] has proposed various models for unconditionally secure signature schemes, but these models do not fully treat the implications of having multiple verification algorithms or analyze the need for (and trust questions associated with) having a dispute resolution mechanism. We address both of these issues in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Shikata et al [12] introduced a model using notions from public-key cryptography, which was also adopted in the work by Hara et al [7] on blind signatures. Safavi-Naini et al [10] presented a MAC-based model meant to encompass the notions developed by Shikata et al In this work, we present a new security model.…”
Section: Introductionmentioning
confidence: 99%