Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,330,382 papers from all fields of science
Search
Sign In
Create Free Account
Digital signature forgery
Known as:
Selective forgery
, Forgery (disambiguation)
, Existential forgery
Expand
In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, , and a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Cryptography
Digital signature
RSA (cryptosystem)
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig
,
Maria Eichlseder
,
Florian Mendel
Fast Software Encryption Workshop
2015
Corpus ID: 1879238
We present a forgery attack on Prost-OTR in a related-key setting. Prost is a family of authenticated encryption algorithms…
Expand
2014
2014
Hidden attribute-based signcryption scheme for lattice
Xinyin Xiang
,
Hui Li
,
Mingyu Wang
,
Zhenhua Liu
Secur. Commun. Networks
2014
Corpus ID: 8637948
As a novel cryptographic primitive, signcryption realizes the function of digital signature and public-key encryption…
Expand
2014
2014
Toward secure strong designated verifier signature scheme from identity-based system
Han-Yu Lin
˜The œinternational Arab journal of information…
2014
Corpus ID: 6678876
A Designated Verifier Signature (DVS) scheme has the property of signer ambiguity, which can only convince a designated verifier…
Expand
2014
2014
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
Georg Fuchsbauer
,
Christian H. Hanser
,
Daniel Slamanig
IACR Cryptology ePrint Archive
2014
Corpus ID: 17538503
At ASIACRYPT’14 Hanser and Slamanig proposed a new primitive called structure-preserving signatures on equivalence classes (SPS…
Expand
2014
2014
Proxy Signatures for General Access Structures
Tadatoshi Tanimura
,
Masayuki Abe
,
T. Okamoto
2014
Corpus ID: 102345214
Proxy signature schemes allow a signer to delegate his/her right to sign messages to someone else or a group of people that…
Expand
2011
2011
An Identity Based Aggregate Signature from Pairings
Yike Yu
,
Xuefeng Zheng
,
Hua Sun
J. Networks
2011
Corpus ID: 11682211
An aggregate signature is a useful digital signature that supports aggregation: Given n signatures on n distinct messages from n…
Expand
2011
2011
An Efficient and Secure Identity-Based Strong Designated Verifier Signature Scheme
Eunjun Yoon
Information Technology and Control
2011
Corpus ID: 1446338
A strong designated verifier signature scheme makes it possible for a signer to convince a designatedverifier that she has signed…
Expand
2011
2011
Efficient ID-Based Signature Scheme from Bilinear Map
R. Sahu
,
Sahadeo Padhye
2011
Corpus ID: 115374567
We propose an identity (ID)-based signature scheme from bilinear map. The scheme is proved secure against existential forgery on…
Expand
2006
2006
Verifiably Encrypted Signature Scheme with Threshold Adjudication
M. C. Gorantla
,
A. Saxena
IACR Cryptology ePrint Archive
2006
Corpus ID: 17031085
Verifiably encrypted signature is useful in handling the fair exchange problem especially, online contract signing. In this paper…
Expand
Review
1980
Review
1980
Review of social service organisation needed?
G. Lythe
1980
Corpus ID: 62170148
Nor do I agree with him that money, fame, and power are the usual motives behind such forgeries. There is, however, a long…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE