UNCONDITIONALLY-SECURE DIGITAL-SIGNATURES

被引:0
|
作者
CHAUM, D [1 ]
ROIJAKKERS, S [1 ]
机构
[1] EINDHOVEN UNIV TECHNOL, 5600 MB EINDHOVEN, NETHERLANDS
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
All known digital signature schemes can be forged by anyone having enough computing power. For a finite set of participants, we can overcome this weakness. We present a polynomial time protocol in which a participant can convince (with an exponentially small error probability) any other participant that his signature is valid. Moreover, such a convinced participant can convince any other participant of the signature's validity, without interaction with the original signer. An extension allows, in most cases, a participant who receives a signature from any source to convince each other participant of its validity. If a participant cannot use the signature to convince others, he knows so when he receives it.
引用
收藏
页码:206 / 214
页数:9
相关论文
共 50 条
  • [1] DIGITAL-SIGNATURES FOR SECURE DATA
    VONSOLMS, SH
    [J]. SOUTH AFRICAN JOURNAL OF SCIENCE, 1989, 85 (01) : 22 - 22
  • [2] General group authentication codes and their relation to "unconditionally-secure signatures"
    Safavi-Naini, R
    McAven, L
    Yung, M
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 231 - 247
  • [3] Efficient unconditionally secure digital signatures
    Hanaoka, G
    Shikata, J
    Zheng, YL
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 120 - 130
  • [4] DIGITAL-SIGNATURES
    SCHNEIER, B
    [J]. BYTE, 1993, 18 (12): : 309 - 312
  • [5] IMPLEMENTATION OF DIGITAL-SIGNATURES
    ARAZI, B
    [J]. ELECTRONICS LETTERS, 1982, 18 (21) : 900 - 901
  • [6] EFFICIENT AND SECURE MULTIPARTY GENERATION OF DIGITAL-SIGNATURES BASED ON DISCRETE LOGARITHMS
    CERECEDO, M
    MATSUMOTO, T
    IMAI, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (04) : 532 - 545
  • [7] DIGITAL-SIGNATURES AND THEIR USES
    GANLEY, MJ
    [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 385 - 391
  • [8] An efficient and unconditionally-secure oblivious polynomial evaluation protocol
    Yang Bo
    Wang Qinglong
    Cao Yunfei
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 181 - +
  • [9] Unconditionally-Secure Robust Secret Sharing with Compact Shares
    Cevallos, Alfonso
    Fehr, Serge
    Ostrovsky, Rafail
    Rabani, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 195 - 208
  • [10] DIGITAL-SIGNATURES - A TUTORIAL SURVEY
    AKL, SG
    [J]. COMPUTER, 1983, 16 (02) : 15 - 24