The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Este artigo propõe os primeiros esquemas de múltiplas assinaturas comprovadamente seguros sob o modelo oracle aleatório. A segurança dos nossos esquemas pode ser comprovada no sentido de segurança concreta na Ref. [13]. Os esquemas propostos são eficientes se o oráculo aleatório for substituído por funções hash práticas. As técnicas essenciais em nossa prova de segurança são as redução ideal desde quebrar a identificação correspondente até quebrar assinaturas (Técnica de redução de ID), e as lemas hierárquicos de linhas pesadas usado na redução concreta da resolução do problema primitivo até a quebra do esquema de identificação.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Kazuo OHTA, Tatsuaki OKAMOTO, "Multi-Signature Schemes Secure against Active Insider Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E82-A, no. 1, pp. 21-31, January 1999, doi: .
Abstract: This paper proposes the first provably secure multi-signature schemes under the random oracle model. The security of our schemes can be proven in the sense of concrete security in Ref. [13]. The proposed schemes are efficient if the random oracle is replaced by practical hash functions. The essential techniques in our proof of security are the optimal reduction from breaking the corresponding identification to breaking signatures (ID Reduction Technique), and the hierarchical heavy row lemmas used in the concrete reduction from solving the primitive problem to breaking the identification scheme.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e82-a_1_21/_p
Copiar
@ARTICLE{e82-a_1_21,
author={Kazuo OHTA, Tatsuaki OKAMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Multi-Signature Schemes Secure against Active Insider Attacks},
year={1999},
volume={E82-A},
number={1},
pages={21-31},
abstract={This paper proposes the first provably secure multi-signature schemes under the random oracle model. The security of our schemes can be proven in the sense of concrete security in Ref. [13]. The proposed schemes are efficient if the random oracle is replaced by practical hash functions. The essential techniques in our proof of security are the optimal reduction from breaking the corresponding identification to breaking signatures (ID Reduction Technique), and the hierarchical heavy row lemmas used in the concrete reduction from solving the primitive problem to breaking the identification scheme.},
keywords={},
doi={},
ISSN={},
month={January},}
Copiar
TY - JOUR
TI - Multi-Signature Schemes Secure against Active Insider Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 21
EP - 31
AU - Kazuo OHTA
AU - Tatsuaki OKAMOTO
PY - 1999
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E82-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 1999
AB - This paper proposes the first provably secure multi-signature schemes under the random oracle model. The security of our schemes can be proven in the sense of concrete security in Ref. [13]. The proposed schemes are efficient if the random oracle is replaced by practical hash functions. The essential techniques in our proof of security are the optimal reduction from breaking the corresponding identification to breaking signatures (ID Reduction Technique), and the hierarchical heavy row lemmas used in the concrete reduction from solving the primitive problem to breaking the identification scheme.
ER -