Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Digital signature forgery

Known as: Selective forgery, Forgery (disambiguation), Existential forgery 
In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, , and a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Abstract. Since the appearance of public-key cryptography in the seminal Diffie—Hellman paper, many new schemes have been… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
  • Xunyu Pan, Siwei Lyu
  • IEEE Transactions on Information Forensics and…
  • 2010
  • Corpus ID: 6970882
Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a new signature scheme which is existentially unforgeable under chosen message attacks, assuming some variant of the… Expand
  • figure 1
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In this paper, we address the question of providing security proofs for signature schemes in the so-called random oracle model [1… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Much research in theoretical cryptography has been centered around finding the weakest possible cryptographic assumptions… Expand
Is this relevant?