Advances in Cryptology-Crypt0’ 90
DOI: 10.1007/3-540-38424-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally-Secure Digital Signatures

Abstract: Abstract. All known digital signature schemes can be forged by anyone having enough computing power. For a finite set of participants, we can overcome this Wealaress.We present a polynomial time protocol in which a participant can convince (with an exponentially small error probability) any other participant that his signature is valid. Moreover, such a convinced participant can convince any other participant of the signature's validity, without inreraction with the original signer.An extension allows. in most… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
55
0
1

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(57 citation statements)
references
References 9 publications
1
55
0
1
Order By: Relevance
“…This is very important when one wants to achieve unconditional security. In the case of classical protocols, digital pseudo-signatures [10] should be used, where key is one-use and expensive to generate. Finally, our protocol can be used in solving some purely quantum protocols involving timely decisions between spatially distant parties, such was the case of simultaneous dense coding and teleportation [11].…”
Section: Introductionmentioning
confidence: 99%
“…This is very important when one wants to achieve unconditional security. In the case of classical protocols, digital pseudo-signatures [10] should be used, where key is one-use and expensive to generate. Finally, our protocol can be used in solving some purely quantum protocols involving timely decisions between spatially distant parties, such was the case of simultaneous dense coding and teleportation [11].…”
Section: Introductionmentioning
confidence: 99%
“…The first unconditionally secure signature was proposed by Chaum and Roijakkers [5]. There have been many attempts to enhance conventional unconditionally secure authentication codes [13] [27] with extra security-properties that are required by signature schemes.…”
Section: Introductionmentioning
confidence: 99%
“…The proofs follow in the same way as with a randomly chosen matrix but with an extra hybrid step to go from random matrix elements to matrix elements generated by a pseudorandom function. 9 The cost of generating a signature can be reduced further. Gen AS can produce a prefactored matrix (using the LU factorization, for instance) for use by Sign AS on the righthand side of (1).…”
Section: λ-Completenessmentioning
confidence: 99%
“…λ-Limited Transferability Chaum and Roijakkers [9] were the first to suggest constructing tags that could be transferred a finite number of times. Their scheme allows signed messages to be transferred only once.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation