A general construction for fail-stop signature using authentication codes

被引:0
|
作者
Safavi-Naini, R [1 ]
Susilo, W [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
来源
CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY | 2001年 / 20卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security of an ordinary digital signature relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a forger with unlimited computational power by enabling the sender to provide a proof of forgery, if it occurs. In this paper, we describe a method of constructing fail-stop signature schemes from authentication codes. We also give an example that fits this general construction and prove its security.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
  • [31] Fail-stop verifiable secret sharing schemes
    Susilo, W
    Mu, Y
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 663 - 667
  • [32] The Fail-Stop Controller AE11
    Bohl, E
    Lindenkreuz, T
    Stephan, R
    ITC - INTERNATIONAL TEST CONFERENCE 1997, PROCEEDINGS: INTEGRATING MILITARY AND COMMERCIAL COMMUNICATIONS FOR THE NEXT CENTURY, 1997, : 567 - 577
  • [33] FAIL-STOP DESIGNATED RECIPIENT SIGNATURE SCHEME BASED ON ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEM
    Tahat, Nedal
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2013, (31): : 205 - 218
  • [34] NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow
    Lu, Ruiming
    Xu, Erci
    Zhang, Yiming
    Zhu, Zhaosheng
    Wang, Mengtian
    Zhu, Zongpeng
    Xue, Guangtao
    Li, Minglu
    Wu, Jiesheng
    PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 1005 - 1019
  • [35] GENERALIZED AGREEMENT BETWEEN CONCURRENT FAIL-STOP PROCESSES
    BURNS, JE
    CRUZ, RI
    LOUI, MC
    DISTRIBUTED ALGORITHMS, 1993, 725 : 84 - 98
  • [36] BYZANTINE GENERALS IN ACTION - IMPLEMENTING FAIL-STOP PROCESSORS
    SCHNEIDER, FB
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1984, 2 (02): : 145 - 154
  • [37] Efficient Fail-Stop Signatures from the Factoring Assumption
    Mashatan, Atefeh
    Ouafi, Khaled
    INFORMATION SECURITY, 2011, 7001 : 372 - 385
  • [38] Factorization-based fail-stop signatures revisited
    Schmidt-Samoa, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 118 - 131
  • [39] Fail-stop failure recovery in neighbor replica environment
    Noor, Ahmad Shukri Mohd
    Deris, Mustafa Mat
    4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 1040 - 1045
  • [40] Design method, fail-stop safety model, and embedded application
    Sveda, M
    JOURNAL OF SYSTEMS ARCHITECTURE, 1997, 43 (1-5) : 47 - 57