A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
@inproceedings{Abe1999ASS, title={A Signature Scheme with Message Recovery as Secure as Discrete Logarithm}, author={M. Abe and T. Okamoto}, booktitle={ASIACRYPT}, year={1999} }
This paper, for the first time, presents a provably secure signature scheme with message recovery based on the (elliptic-curve) discrete logarithm. The proposed scheme can be proven to be secure in the strongest sense (i.e., existentially unforgeable against adaptively chosen message attacks) in the random oracle model under the (elliptic-curve) discrete logarithm assumption. We give the concrete analysis of the security reduction. When practical hash functions are used in place of truly random… CONTINUE READING
Topics from this paper
58 Citations
Signature Scheme with Arbitrary Length Message Recovery in CPK
- Computer Science
- 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks
- 2008
- 2
A novel identity-based signature with message recovery from RSA
- Mathematics, Computer Science
- Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology
- 2011
- 2
Efficient Identity-based Signature Scheme with Partial Message Recovery
- Computer Science
- Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
- 2007
- 4
Lattice-based message recovery signature schemes
- Computer Science
- Int. J. Electron. Secur. Digit. Forensics
- 2013
- 2
- Highly Influenced
An Extension to Modified Harn Digital Signature Scheme with the Feature of Message Recovery
- Computer Science
- 2018
- 1
PECDSA. How to build a DL-based digital signature scheme with the best proven security
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2002
- 5
- PDF
References
SHOWING 1-10 OF 21 REFERENCES
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
- Computer Science
- EUROCRYPT
- 1994
- 246
- PDF
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
- Mathematics, Computer Science
- EUROCRYPT
- 1996
- 984
- Highly Influential
- PDF
On Concrete Security Treatment of Signatures Derived from Identification
- Mathematics, Computer Science
- CRYPTO
- 1998
- 125
- PDF
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves
- Mathematics, Computer Science
- ASIACRYPT
- 1996
- 30
- Highly Influential
- PDF
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Mathematics, Computer Science
- SIAM J. Comput.
- 1988
- 2,768
- PDF
Universal one-way hash functions and their cryptographic applications
- Mathematics, Computer Science
- STOC '89
- 1989
- 991
- PDF
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
- Mathematics, Computer Science
- CRYPTO
- 1998
- 621
- PDF