<--- Back to Details
First PageDocument Content
Strong RSA assumption / Full Domain Hash / RSA / Rabin signature algorithm / Group signature / Cryptography / Public-key cryptography / Digital signature
Date: 2012-05-22 17:51:17
Strong RSA assumption
Full Domain Hash
RSA
Rabin signature algorithm
Group signature
Cryptography
Public-key cryptography
Digital signature

Add to Reading List

Source URL: infoscience.epfl.ch

Download Document from Source Website

File Size: 416,83 KB

Share Document on Facebook

Similar Documents

Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document

RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

DocID: 1atOP - View Document

Electronic commerce / Cryptographic protocols / Digital signature / Blind signature / RSA / BLS / Full Domain Hash / Token / Ecash / Cryptography / Public-key cryptography / Financial cryptography

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

DocID: 19A4N - View Document

Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

DocID: 16pCW - View Document

RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

DocID: 15ra5 - View Document