Practical Signatures from Standard Assumptions

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks

Publikation: Beitrag in Buch oder TagungsbandVortrag mit Beitrag in TagungsbandBegutachtung

Abstract

We put forward new techniques for designing signature schemes. As a result, we present practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our schemes compare favorably with existing schemes based on these assumptions.
Our core idea is the use of tag-based signatures. Concretely, each signatures contains a tag which is uniformly chosen from a suitable tag set. Intuitively, the tag provides a way to embed instances of computational problems. Indeed, carefully choosing these tag spaces provides new ways to partition the set of possible message-tag pairs into “signable” and “unsignable” pairs. In our security proof, we will thus be able to sign all adversarially requested messages, and at the same time use an adversarially generated forgery with suitably large probability.
OriginalspracheEnglisch
Titel32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013
Herausgeber (Verlag)Springer
Seiten461-485
Band7881
DOIs
PublikationsstatusVeröffentlicht - 2013
VeranstaltungEUROCRYPT 2013: Advances in Cryptology – EUROCRYPT 2013 - Athens, Athens, Griechenland
Dauer: 26 Mai 201330 Mai 2013

Konferenz

KonferenzEUROCRYPT 2013: Advances in Cryptology – EUROCRYPT 2013
Land/GebietGriechenland
StadtAthens
Zeitraum26/05/1330/05/13

Research Field

  • Cyber Security

Fingerprint

Untersuchen Sie die Forschungsthemen von „Practical Signatures from Standard Assumptions“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren