Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper deals with Nyberg-Rueppel digital signatures without message recovery. Probability of signature forgery is analyzed and assessed. Some simple methods to minimize probability of signature forgery are proposed.
Rocznik
Tom
Strony
817--825
Opis fizyczny
Bibliogr. 12, rys.
Twórcy
autor
- Institute of Electronic Systems, Warsaw University of Technology, 15/19 Nowowiejska St., 00-665 Warsaw, Poland
autor
- Institute of Mathematical Machines, 34 Krzywickiego St., 02-078 Warsaw, Poland
Bibliografia
- [1] A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press Inc., 1997, (http://cacr.math.uwaterloo.ca/hac).
- [2] J. Pieprzyk, T. Hardjono, and J. Seberry, Fundamentals of Computer Security, Springer, Berlin, 2003.
- [3] V. Shoup, A Computational Introduction to Number Theory and Algebra, Cambridge University Press, Cambridge, 2008.
- [4] S. Yan, Number Theory for Computing, Springer, Berlin- Heidelberg, 2002.
- [5] N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, 1994.
- [6] W. Narkiewicz, Number Theory, PWN, Warszawa, 1990, (in Polish).
- [7] K. Maurin, Analysis, PWN, Warszawa, 1991, (in Polish).
- [8] J. Jakubowski and R. Sztencel, Introduction to Probability Theory, Script, Warszawa, 2004, (in Polish).
- [9] C.C. Lin and C.S. Laih, “Cryptanalysis of Nyberg-Ruppel’s message recovery scheme”, IEEE Communications Letters 4 (7), 231-232 (2000), DOI: 10.1109/4234.852925.
- [10] G. Ateniese and B. Medeiros, “A provably secure Nyberg- Rueppel signature variant with applications”, Cryptology ePrint Archive, Report 2004/93, (http://eprint.iacr.org) (2004).
- [11] 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography. 2000. DOI:10.1109/IEEESTD.2000.92292.
- [12] I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, University of Cambridge, Cambridge, 2002.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8ba19a50-287e-4c53-9545-4cf001f242b3