New and efficient fail-stop signature scheme

被引:0
|
作者
机构
[1] Susilo, Willy
[2] Safavi-Naini, Rei
[3] Gysin, Marc
[4] Seberry, Jennifer
来源
Susilo, Willy | 1600年 / Oxford Univ Press, Oxford, United Kingdom卷 / 43期
关键词
Experimental; (EXP);
D O I
暂无
中图分类号
学科分类号
摘要
The security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a forger with unlimited computational power by enabling the sender to provide a proof of forgery if it occurs. In this paper we give an efficient fail-stop signature scheme that uses two hard problems, discrete logarithm and factorization, as the basis of a receiver's security. We show that the scheme has provable security against adaptively chosen message attack, and is the most efficient scheme with respect to the ratio of the message length to the signature length. The scheme provides an efficient solution to signing messages up to 1881 bits.
引用
收藏
相关论文
共 50 条
  • [21] Threshold fail-stop signature schemes based on discrete logarithm and factorization
    Safavi-Naini, R
    Susilo, W
    INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 292 - 307
  • [22] Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature
    Lim, JongBeom
    Yu, HeonChang
    Gil, Joon-Min
    SYMMETRY-BASEL, 2017, 9 (03):
  • [23] That's Not My Signature! Fail-Stop Signatures for a Post-quantum World
    Boschini, Cecilia
    Dahari, Hila
    Naor, Moni
    Ronen, Eyal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 107 - 140
  • [24] Assured reconfiguration of fail-stop systems
    Strunk, EA
    Knight, JC
    Aiello, MA
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 2 - 11
  • [25] Checkpointing Workflows for Fail-Stop Errors
    Han, Li
    Canon, Louis-Claude
    Casanova, Henri
    Robert, Yves
    Vivien, Frederic
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (08) : 1105 - 1120
  • [26] Checkpointing Workflows for Fail-Stop Errors
    Han, Li
    Canon, Louis-Claude
    Casanova, Henri
    Robert, Yves
    Vivien, Frederic
    2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 487 - 497
  • [27] How fail-stop are faulty programs?
    Chandra, S
    Chen, PM
    TWENTY-EIGHTH ANNUAL INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT COMPUTING, DIGEST PAPERS, 1998, : 240 - 249
  • [28] On the security for the fail-stop digital signatures
    Zhang, QH
    Zheng, JM
    Yang, CD
    WAVELET ANALYSIS AND ITS APPLICATIONS (WAA), VOLS 1 AND 2, 2003, : 814 - 820
  • [29] Fail-stop components by pattern matching
    Janowski, T
    Mostowski, WI
    FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS IV, 2000, 49 : 351 - 370
  • [30] Extremely Simple Fail-Stop ECDSA Signatures
    Yaksetig, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 230 - 234