Advertisement

A Remark on a Signature Scheme Where Forgery can be Proved

  • Gerrit Bleumer
  • Birgit Pfitzmann
  • Michael Waidner
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 473)

Abstract

A new type of signature scheme, a signature scheme where forgery by an unexpectedly powerful attacker is provable, was suggested in [11]: if the signature of an honest participant Alice is forged, she can prove this forgery with arbitrarily high probability.

Keywords

Signature Scheme Digital Signature Scheme Honest Participant Free Permutation Dine Cryptographer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    Gerrit Bleumer: Vertrauenswürdige Schlüssel für ein Signatursystem, dessen Brechen beweisbar ist; Studienarbeit, Universität Karlsruhe 1990 (in preparation).Google Scholar
  2. [2]
    Ivan Bjerre Damgård: Collision free hash functions and public key signature schemes; Eurocrypt’ 87, LNCS 304, Springer-Verlag, Berlin 1988, 203–216.Google Scholar
  3. [3]
    Whitfield Diffie, Martin E. Hellman: New Directions in Cryptography; IEEE Transactions on Information Theory 22/6 (1976) 644–654.MathSciNetzbMATHCrossRefGoogle Scholar
  4. [4]
    Oded Goldreich: Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme; Crypto’ 86, LNCS 263, Springer-Verlag, Berlin 1987, 104–110.Google Scholar
  5. [5]
    Shafi Goldwasser, Silvio Micali, Ronald L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks; SIAM J. Comput. 17/2 (1988) 281–308.MathSciNetzbMATHCrossRefGoogle Scholar
  6. [6]
    Oded Goldreich, Silvio Micali, Avi Wigderson: Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design; 27th FOCS, IEEE 1986, 174–187.Google Scholar
  7. [7]
    Ralph C. Merkle: Protocols for Public Key Cryptosystems; Symposium on Security and Privacy, Oakland 1980, 122–134.Google Scholar
  8. [8]
    Ralph C. Merkle: A digital signature based on a conventional encryption function; Crypto’ 87, LNCS 293, Springer-Verlag, Berlin 1988, 369–378.Google Scholar
  9. [9]
    Ralph C. Merkle: Secrecy, authentication, and public key systems; UMI Research Press 1982.Google Scholar
  10. [10]
    Birgit Pfitzmann: Für den Unterzeichner sichere digitale Signaturen und ihre Anwendung; Diplomarbeit, Universität Karlsruhe 1989.Google Scholar
  11. [11]
    Michael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability; Universität Karlsruhe 1989; presented at Eurocrypt’ 89.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Gerrit Bleumer
    • 1
  • Birgit Pfitzmann
    • 1
  • Michael Waidner
    • 1
  1. 1.Institut für Rechnerentwurf und FehlertoleranzUniversität KarlsruheKarlsruhe 1F. R. Germany

Personalised recommendations