The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Este artigo, pela primeira vez, apresenta uma comprovadamente seguro esquema de assinatura com recuperação de mensagens baseado no logaritmo discreto de curva elíptica. O esquema proposto provou ser seguro no sentido mais forte (isto é, existencialmente impossível de ser falsificado contra ataques de mensagens escolhidas adaptativamente) no modelo oráculo aleatório sob a suposição de logaritmo discreto. Damos uma análise concreta da redução da segurança. Quando funções hash práticas são usadas no lugar de funções verdadeiramente aleatórias o esquema proposto é quase tão eficiente quanto a versão de curva elíptica do esquema de assinatura de Schnorr e esquemas existentes com recuperação de mensagens como a versão de curva elíptica do Nyberg-Rueppel e Esquemas de Miyaji.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Masayuki ABE, Tatsuaki OKAMOTO, "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm" in IEICE TRANSACTIONS on Fundamentals,
vol. E84-A, no. 1, pp. 197-204, January 2001, doi: .
Abstract: This paper, for the first time, presents a provably secure signature scheme with message recovery based on the elliptic-curve discrete logarithm. The proposed scheme is proven to be secure in the strongest sense (i.e., existentially unforgeable against adaptively chosen message attacks) in the random oracle model under the discrete logarithm assumption. We give a concrete analysis of the security reduction. When practical hash functions are used in place of truly random functions, the proposed scheme is almost as efficient as the elliptic-curve version of the Schnorr signature scheme and existing schemes with message recovery such as the elliptic-curve version of the Nyberg-Rueppel and Miyaji schemes.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e84-a_1_197/_p
Copiar
@ARTICLE{e84-a_1_197,
author={Masayuki ABE, Tatsuaki OKAMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Signature Scheme with Message Recovery as Secure as Discrete Logarithm},
year={2001},
volume={E84-A},
number={1},
pages={197-204},
abstract={This paper, for the first time, presents a provably secure signature scheme with message recovery based on the elliptic-curve discrete logarithm. The proposed scheme is proven to be secure in the strongest sense (i.e., existentially unforgeable against adaptively chosen message attacks) in the random oracle model under the discrete logarithm assumption. We give a concrete analysis of the security reduction. When practical hash functions are used in place of truly random functions, the proposed scheme is almost as efficient as the elliptic-curve version of the Schnorr signature scheme and existing schemes with message recovery such as the elliptic-curve version of the Nyberg-Rueppel and Miyaji schemes.},
keywords={},
doi={},
ISSN={},
month={January},}
Copiar
TY - JOUR
TI - A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 197
EP - 204
AU - Masayuki ABE
AU - Tatsuaki OKAMOTO
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E84-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2001
AB - This paper, for the first time, presents a provably secure signature scheme with message recovery based on the elliptic-curve discrete logarithm. The proposed scheme is proven to be secure in the strongest sense (i.e., existentially unforgeable against adaptively chosen message attacks) in the random oracle model under the discrete logarithm assumption. We give a concrete analysis of the security reduction. When practical hash functions are used in place of truly random functions, the proposed scheme is almost as efficient as the elliptic-curve version of the Schnorr signature scheme and existing schemes with message recovery such as the elliptic-curve version of the Nyberg-Rueppel and Miyaji schemes.
ER -