New and efficient fail-stop signature scheme

被引:0
|
作者
机构
[1] Susilo, Willy
[2] Safavi-Naini, Rei
[3] Gysin, Marc
[4] Seberry, Jennifer
来源
Susilo, Willy | 1600年 / Oxford Univ Press, Oxford, United Kingdom卷 / 43期
关键词
Experimental; (EXP);
D O I
暂无
中图分类号
学科分类号
摘要
The security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a forger with unlimited computational power by enabling the sender to provide a proof of forgery if it occurs. In this paper we give an efficient fail-stop signature scheme that uses two hard problems, discrete logarithm and factorization, as the basis of a receiver's security. We show that the scheme has provable security against adaptively chosen message attack, and is the most efficient scheme with respect to the ratio of the message length to the signature length. The scheme provides an efficient solution to signing messages up to 1881 bits.
引用
收藏
相关论文
共 50 条
  • [41] Constructions of Fail-Stop Signatures for Multi-Signer Setting
    Kitajima, Nobuaki
    Yanai, Naoto
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 112 - 123
  • [42] Optimal resilience patterns to cope with fail-stop and silent errors
    Benoit, Anne
    Cavelan, Aurelien
    Robert, Yves
    Sun, Hongyang
    2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, : 202 - 211
  • [43] Peacenik: Architecture Support for Not Failing under Fail-Stop Memory Consistency
    Zhang, Rui
    Biswas, Swarnendu
    Balaji, Vignesh
    Bond, Michael D.
    Lucia, Brandon
    TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, : 317 - 333
  • [44] Coping with silent and fail-stop errors at scale by combining replication and checkpointing
    Benoit, Anne
    Cavelan, Aurelien
    Cappello, Franck
    Raghavan, Padma
    Robert, Yves
    Sun, Hongyang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 209 - 225
  • [45] On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    Damgard, IB
    Pedersen, TP
    Pfitzmann, B
    JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 163 - 194
  • [46] On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    Ivan B. Damgård
    Torben P. Pedersen
    Birgit Pfitzmann
    Journal of Cryptology, 1997, 10 : 163 - 194
  • [47] FAIL-STOP PROCESSORS - AN APPROACH TO DESIGNING FAULT-TOLERANT COMPUTING SYSTEMS
    SCHLICHTING, RD
    SCHNEIDER, FB
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 222 - 238
  • [48] 一种新的Fail-stop盲签名方案
    何金妮
    辛小龙
    高师理科学刊, 2010, 30 (03) : 15 - 16+19
  • [49] Reliability of task graph schedules with transient and fail-stop failures: complexity and algorithms
    Anne Benoit
    Louis-Claude Canon
    Emmanuel Jeannot
    Yves Robert
    Journal of Scheduling, 2012, 15 : 615 - 627
  • [50] Reliability of task graph schedules with transient and fail-stop failures: complexity and algorithms
    Benoit, Anne
    Canon, Louis-Claude
    Jeannot, Emmanuel
    Robert, Yves
    JOURNAL OF SCHEDULING, 2012, 15 (05) : 615 - 627