Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(<Special Section>Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
We proposed a one-way trapdoor permutation f based multi-signature scheme which can keep tighter reduction rate. Assuming the underlying hash functions are ideal, our proposed scheme is not only provably secure, but are so in a tight. An ability to forge multi-signatures with a certain amount of computational resources implies the ability to invert a one-way trapdoor permutation f (on the same size modulus) with about the same computational effort. The proposed scheme provides the exact security against Adaptive-Chosen-Message-Attack and Adaptive-Insider-Attack by F [10]. F can also attack in key generation phase, and act in collusion with corrupted signers.
- 社団法人電子情報通信学会の論文
- 2004-05-01
著者
-
OHTA Kazuo
Department of Information and Communication Engineering, The University of Electro-Communications
-
Komano Yuichi
Graduate School Of Science And Engineering Waseda University:(present Address)corporate Research &am
-
KAWAUCHI KEI
Graduate School of Science and Technology, Chiba University
-
TADA MITSURU
Institute of Media and Information Technology, Chiba University
-
Kawauchi Kei
Graduate School Of Science And Technology Chiba University
-
Tada Mitsuru
Institute Of Media And Information Technology Chiba University
-
Ohta Kazuo
Department Of Information And Communication Engineering The University Of Electro-communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
TADA Mitsuru
Institute of Media and Information Technology, Chiba University,
関連論文
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Provably Secure Multi-signature Scheme with Signers' Intentions
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(Discrete Mathematics and Its Applications)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- On the Security and the Efficiency of Multi-Signature Schemes Based on a Trapdoor One-Way Permutation(Discrete Mathematics and Its Applications)
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Maurer-Yacobi ID-Based Key Distribution Revisited(Discrete Mathematics and Its Applications)
- Security of Cryptosystems Using Merkle-Damgard in the Random Oracle Model
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- A Secure Multisignature Scheme with Signing Order Verifiability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme Based on NP-Complete Lattice Problems
- New NP-Complete Problems Associated with Lattices(Discrete Mathematics and Its Applications)
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis