A general construction for fail-stop signature using authentication codes

被引:0
|
作者
Safavi-Naini, R [1 ]
Susilo, W [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
来源
CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY | 2001年 / 20卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security of an ordinary digital signature relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a forger with unlimited computational power by enabling the sender to provide a proof of forgery, if it occurs. In this paper, we describe a method of constructing fail-stop signature schemes from authentication codes. We also give an example that fits this general construction and prove its security.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
  • [21] Assured reconfiguration of fail-stop systems
    Strunk, EA
    Knight, JC
    Aiello, MA
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 2 - 11
  • [22] Checkpointing Workflows for Fail-Stop Errors
    Han, Li
    Canon, Louis-Claude
    Casanova, Henri
    Robert, Yves
    Vivien, Frederic
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (08) : 1105 - 1120
  • [23] Checkpointing Workflows for Fail-Stop Errors
    Han, Li
    Canon, Louis-Claude
    Casanova, Henri
    Robert, Yves
    Vivien, Frederic
    2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 487 - 497
  • [24] How fail-stop are faulty programs?
    Chandra, S
    Chen, PM
    TWENTY-EIGHTH ANNUAL INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT COMPUTING, DIGEST PAPERS, 1998, : 240 - 249
  • [25] On the security for the fail-stop digital signatures
    Zhang, QH
    Zheng, JM
    Yang, CD
    WAVELET ANALYSIS AND ITS APPLICATIONS (WAA), VOLS 1 AND 2, 2003, : 814 - 820
  • [26] Fail-stop components by pattern matching
    Janowski, T
    Mostowski, WI
    FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS IV, 2000, 49 : 351 - 370
  • [27] Fail-stop authentication protocol for digital rights management in adaptive information retrieval system
    Ma, ZF
    Feng, BQ
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT: PROCEEDINGS, 2004, 3129 : 76 - 86
  • [28] ECC-Based Multi-Document Fail-Stop Signature Encryption Scheme
    Tsai, Chien-Hua
    Su, Pin-Chang
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 461 - 473
  • [29] Extremely Simple Fail-Stop ECDSA Signatures
    Yaksetig, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 230 - 234
  • [30] Assessing General-Purpose Algorithms to Cope with Fail-Stop and Silent Errors
    Benoit, Anne
    Cavelan, Aurelien
    Robert, Yves
    Sun, Hongyang
    HIGH PERFORMANCE COMPUTING SYSTEMS: PERFORMANCE MODELING, BENCHMARKING, AND SIMULATION, 2015, 8966 : 215 - 236