Security Analysis of Randomize-Hash-then-Sign Digital Signatures

Abstract

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision… (More)
DOI: 10.1007/s00145-011-9109-y

4 Figures and Tables

Topics

  • Presentations referencing similar topics