An Online/Offline Signature Scheme Based on the Strong RSA Assumption

@article{Yu2007AnOS,
  title={An Online/Offline Signature Scheme Based on the Strong RSA Assumption},
  author={Ping Yu and Stephen R. Tate},
  journal={21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)},
  year={2007},
  volume={1},
  pages={601-606}
}
  • Ping Yu, S. Tate
  • Published 21 May 2007
  • Computer Science, Mathematics
  • 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
We propose an efficient digital signature scheme, which is proved secure under the strong RSA assumption, and can operate in an online/offline manner, doing most of its work in the offline precomputation phase. The online phase, which is performed after the message to be signed is known, is very efficient, requiring only a single modular multiplication. Online/offline signatures are useful in settings in which signatures need to be produced quickly either when there is a large volume of… 
Improved Identity Based Online/Offline Signature Scheme
  • Yang MingYumin Wang
  • Computer Science
    2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing
  • 2010
TLDR
A security analysis shows that the proposed identity-based online/offline signature scheme is proved secure against existential forgery on an adaptively chosen message attack under the assumption of Computational Diffie Hellman in the random oracle model.
Direct Online/Offline Digital Signature Schemes.
TLDR
The experimental results demonstrate that the SGE and SGS schemes are the most efficient techniques for embedded device authentication and bursty server authentication, respectively.
Reformed RSA Algorithm Based on Prime Number
TLDR
A new algorithm concept is suggested to presents the modified form of RSA algorithm in order to speed up the implementation of RSAgorithm during data exchange over the network through the use of third prime number.
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
TLDR
An On-line/Off-line signature scheme is constructed, which is secure under the ordinary security model whilst it is insecure in the new model, and a security proof under the old model and a concrete attack of the scheme under thenew model are presented.
Efficient multiple-collision trapdoor hash family
TLDR
A multiple-collision trapdoor hash family under both integer factoring and discrete logarithm problems, and a pair of secret keys is employed for generating digital signature for online and off-line signature schemes.
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families
TLDR
This paper proposes multiple-collision trapdoor hash families based on discrete logarithm and factoring assumptions, and provides formal proofs of their security, and introduces an efficient on-line/off-line signature scheme based on the proposed trapdoorHash families.
Divisible On-Line/Off-Line Signatures
TLDR
A new notion is introduced: divisible on-line/off-line signatures, in which exposure of off-line signature tokens in off-lines phase is allowed and an efficient construction of this type of signatures is proposed.

References

SHOWING 1-10 OF 18 REFERENCES
New Online/Offline Signature Schemes Without Random Oracles
TLDR
A new natural intractability assumption for hash functions is introduced, which can be interpreted as a generalization of second pre-image collision resistance, and is able to construct new signature schemes provably secure under the strong RSA assumption without random oracles.
Improved Online/Offline Signature Schemes
TLDR
The recently introduced notion of a trapdoor hash function is used to develop a new paradigm called hash-sign-switch, which can convert any signature scheme into a highly efficient on-line/off-line signature scheme and enhances the security of the original signature scheme.
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
TLDR
An RSA-based signing scheme which combines essentially optimal efficiency with attractive security properties and a second scheme which maintains all of the above features and in addition provides message recovery is provided.
A Signature Scheme with Efficient Protocols
TLDR
This paper proposes a practical and provably secure signature scheme and shows protocols for issuing a signature on a committed value (so the signer has no information about the signed value), and for proving knowledge of a signing on a commit value.
Signature schemes based on the strong RSA assumption
TLDR
A new digital signature scheme is described that is quite efficient, does not require the signer to maintain any state, and can be proven secure against adaptive chosen message attack under a reasonable intractability assumption, the so-called strong RSA assumption.
Efficient signature generation by smart cards
  • C. Schnorr
  • Computer Science, Mathematics
    Journal of Cryptology
  • 2004
TLDR
An efficient algorithm that preprocesses the exponentiation of a random residue modulo p is presented, which improves the ElGamal signature scheme in the speed of the procedures for the generation and the verification of signatures and also in the bit length of signatures.
A public key cryptosystem and a signature scheme based on discrete logarithms
  • Taher El Gamal
  • Computer Science, Mathematics
    IEEE Trans. Inf. Theory
  • 1984
TLDR
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Random Oracle Model
  • G. Bleumer
  • Computer Science
    Encyclopedia of Cryptography and Security
  • 2005
A reworking tool for ceramic substrate hybrid circuits has a metal base for sitting on a heated surface, a support member support above the base and a pillar of heat conductive material attached to
Chameleon Signatures
...
...