Have a personal or library account? Click to login
Security of signature schemes in the presence of key-dependent messages Cover

Security of signature schemes in the presence of key-dependent messages

Open Access
|Nov 2012

References

  1. [ACPS09] APPLEBAUM, B.-CASH, D.-PEIKERT, C.-SAHAI, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems, in: Advances in Cryptology-CRYPTO ’09 (S. Halevi, ed.), 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2009. Lecture Notes in Comput. Sci., Vol. 5677, Springer, Berlin, 2009, pp. 595-618.
  2. [BHHO08] BONEH, D.-HALEVI, S.-HAMBURG, M.-OSTROVSKY, R.: Circularsecure encryption from decision Diffie-Hellman, in: Advances in Cryptology-CRYPTO ’08 (D. Wagner, ed.), 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2008, Lecture Notes in Comput. Sci., Vol. 5157, Springer, Berlin, 2008, pp. 108-125.
  3. [BM99a] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme, in: Advances in Cryptology-CRYPTO ’99, Lecture Notes in Comput. Sci., Vol. 1666, Springer, Berlin, 1999, pp. 431-448.
  4. [BM99b] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme, http://cseweb.ucsd.edu/~mihir/papers/fsig.html, July, 1999, Full version of [BM99a].10.1007/3-540-48405-1_28
  5. [BPS07] BACKES, M.-PFITZMANN, B.-SCEDROV, A.: Key-dependent message security under active attacks-BRSIM/UC-soundness of symbolic encryption with key cycles, in: CSF ’07, Proc. of the 20th IEEE Computer Security Foundations Symposium, IEEE Computer Society, Washington, DC, USA, 2007, pp. 112-124, http://dx.doi.org/10.1109/CSF.2007.23.10.1109/CSF.2007.23
  6. [BRS03] BLACK, J.-ROGAWAY, P.-SHRIMPTON, T.: Encryption-scheme security in the presence of key-dependent messages, in: SAC ’02-Selected Areas in Cryptography (K. Nyberg et al., eds.), 9th Annual International Workshop, St. John’s, Newfoundland, Canada, 2002, Lecture Notes in Comput. Sci., Vol. 2595, Springer, Berlin, 2003, pp. 62-75.
  7. [FKPR09] FAUST, S.-KILTZ, E.-PIETRZAK, K.-ROTHBLUM, G.: Leakage-resilient signatures, Cryptology ePrint Archive: Report 2009/282, June, 2009, http://eprint.iacr.org/2009/282.
  8. [GMR88] GOLDWASSER, S.-MICALI, S.-RIVEST, R. L.: A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17 (1988), 281-308.10.1137/0217017
  9. [Gon09] GONZALEZ, M: Cryptography in the Presence of Key-Dependent Messages. Ph.D. Thesis, Florida Atlantic University, December 2009, http://brain.math.fau.edu/Gonzalez/dissertation.pdf.
  10. [HH08] HAITNER, I.-HOLENSTEINY, T.: On the (im)possibility of key dependent encryption , in: TCC ’09-Theory of Cryptography (O. Reingold, ed.), 6th Theory of Cryptography Conference, San Francisco, CA, USA, 2009, Lecture Notes in Comput. Sci., Vol. 5444, Springer, Berlin, 2009, pp. 202-219.
  11. [HK07] HALEVI, S.-KRAWCZYK, H.: Security under key-dependent inputs, in: Proc. Of the 14th ACM Conference on Computer and Communications Security-CCS ’07 (P. Ning et al., eds.), Alexandria, Virginia, USA, 2007, ACM, New York, NY, USA, 2007, pp. 466-475, http://doi.acm.org/10.1145/1315245.1315303.10.1145/1315245.1315303
  12. [HP01] HABER, S.-PINKAS, B.: Securely combining public-key cryptosystems, in: CCS ’01-Computer and Communications Security (P. Samarati, ed.), 8th ACM Conference, Philadelphia, PA, USA, 2001, ACM, New York, 2001, pp. 215-224.10.1145/501983.502013
  13. [HU08] HOFHEINZ, D.-UNRUH, D.: Towards key-dependent message security in the standard model, in: EUROCRYPT ’08-Advances in Cryptology (N. Smart, ed.), 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, 2008, Lecture Notes in Comput. Sci., Vol. 4965, Springer, Berlin, 2008, pp. 108-126.
  14. [Kat09] KATZ, J.: Signature schemes with bounded leakage resilience, Cryptology ePrint Archive:Report 2009/220, May, 2009, http://eprint.iacr.org/2009/220.10.1007/978-3-642-10366-7_41
  15. [VHS09] GONZ´ALEZ VASCO, M. I.-HESS, F.-STEINWANDT, R.: Combined (identity-based) public key schemes, Cryptology ePrint Archive: Report 2008/466, February, 2009, http://eprint.iacr.org/2008/466.
DOI: https://doi.org/10.2478/v10127-010-0029-2 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 15 - 29
Published on: Nov 13, 2012
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2012 Madeline González Muñiz, Rainer Steinwndt, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons License.