The exact security of digital signatures - How to sign with RSA and Rabin

被引:0
|
作者
Bellare, M [1 ]
Rogaway, P [1 ]
机构
[1] UNIV CALIF DAVIS,DEPT COMP SCI,DAVIS,CA 95616
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We describe an RSA-based signing scheme which combines essentially optimal efficiency with attractive security,properties, Signing takes one RSA decryption plus some hashing, verification takes one RSA encryption plus some hashing, and the size of the signature is the size of the modulus. Assuming the underlying hash functions are ideal, our schemes are not only provably secure, but are so in a tight way-an ability to forge signatures with a certain amount of computational resources implies the ability to invert RSA (on the same size modulus) with about the same computational effort. Furthermore, Ne provide a second scheme which maintains all of the above features and in addition provides message recovery. These ideas extend to provide schemes for Rabin signatures with analogous properties; in particular their security can be tightly related to the hardness of factoring.
引用
收藏
页码:399 / 416
页数:18
相关论文
共 50 条
  • [1] Stronger Security Proofs for RSA and Rabin Bits
    R. Fischlin
    C. P. Schnorr
    [J]. Journal of Cryptology, 2000, 13 : 221 - 244
  • [2] Stronger security proofs for RSA and Rabin bits
    Fischlin, R
    Schnorr, CP
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 221 - 244
  • [3] Security Analysis of Randomize-Hash-then-Sign Digital Signatures
    Gauravaram, Praveen
    Knudsen, Lars R.
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 748 - 779
  • [4] Security Analysis of Randomize-Hash-then-Sign Digital Signatures
    Praveen Gauravaram
    Lars R. Knudsen
    [J]. Journal of Cryptology, 2012, 25 : 748 - 779
  • [5] SOME VARIATIONS ON RSA SIGNATURES AND THEIR SECURITY
    DEJONGE, W
    CHAUM, D
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 49 - 59
  • [6] On the Instantiability of Hash-and-Sign RSA Signatures
    Dodis, Yevgeniy
    Haitner, Iftach
    Tentes, Aris
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 112 - 132
  • [7] How to compress rabin ciphertexts and signatures (and more)
    Gentry, C
    [J]. ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 179 - 200
  • [8] Proving tight security for Rabin-Williams signatures
    Bernstein, Daniel J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 70 - 87
  • [9] Batch verifying multiple RSA digital signatures
    Harn, L
    [J]. ELECTRONICS LETTERS, 1998, 34 (12) : 1219 - 1220
  • [10] On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    Isobe, Shuji
    Shizuya, Hiroki
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 290 - 305