Open Access

Security of signature schemes in the presence of key-dependent messages


Cite

[ACPS09] APPLEBAUM, B.-CASH, D.-PEIKERT, C.-SAHAI, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems, in: Advances in Cryptology-CRYPTO ’09 (S. Halevi, ed.), 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2009. Lecture Notes in Comput. Sci., Vol. 5677, Springer, Berlin, 2009, pp. 595-618.Search in Google Scholar

[BHHO08] BONEH, D.-HALEVI, S.-HAMBURG, M.-OSTROVSKY, R.: Circularsecure encryption from decision Diffie-Hellman, in: Advances in Cryptology-CRYPTO ’08 (D. Wagner, ed.), 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2008, Lecture Notes in Comput. Sci., Vol. 5157, Springer, Berlin, 2008, pp. 108-125.Search in Google Scholar

[BM99a] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme, in: Advances in Cryptology-CRYPTO ’99, Lecture Notes in Comput. Sci., Vol. 1666, Springer, Berlin, 1999, pp. 431-448.Search in Google Scholar

[BM99b] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme, http://cseweb.ucsd.edu/~mihir/papers/fsig.html, July, 1999, Full version of [BM99a].10.1007/3-540-48405-1_28Search in Google Scholar

[BPS07] BACKES, M.-PFITZMANN, B.-SCEDROV, A.: Key-dependent message security under active attacks-BRSIM/UC-soundness of symbolic encryption with key cycles, in: CSF ’07, Proc. of the 20th IEEE Computer Security Foundations Symposium, IEEE Computer Society, Washington, DC, USA, 2007, pp. 112-124, http://dx.doi.org/10.1109/CSF.2007.23.10.1109/CSF.2007.23Search in Google Scholar

[BRS03] BLACK, J.-ROGAWAY, P.-SHRIMPTON, T.: Encryption-scheme security in the presence of key-dependent messages, in: SAC ’02-Selected Areas in Cryptography (K. Nyberg et al., eds.), 9th Annual International Workshop, St. John’s, Newfoundland, Canada, 2002, Lecture Notes in Comput. Sci., Vol. 2595, Springer, Berlin, 2003, pp. 62-75.Search in Google Scholar

[FKPR09] FAUST, S.-KILTZ, E.-PIETRZAK, K.-ROTHBLUM, G.: Leakage-resilient signatures, Cryptology ePrint Archive: Report 2009/282, June, 2009, http://eprint.iacr.org/2009/282.Search in Google Scholar

[GMR88] GOLDWASSER, S.-MICALI, S.-RIVEST, R. L.: A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17 (1988), 281-308.10.1137/0217017Search in Google Scholar

[Gon09] GONZALEZ, M: Cryptography in the Presence of Key-Dependent Messages. Ph.D. Thesis, Florida Atlantic University, December 2009, http://brain.math.fau.edu/Gonzalez/dissertation.pdf.Search in Google Scholar

[HH08] HAITNER, I.-HOLENSTEINY, T.: On the (im)possibility of key dependent encryption , in: TCC ’09-Theory of Cryptography (O. Reingold, ed.), 6th Theory of Cryptography Conference, San Francisco, CA, USA, 2009, Lecture Notes in Comput. Sci., Vol. 5444, Springer, Berlin, 2009, pp. 202-219.Search in Google Scholar

[HK07] HALEVI, S.-KRAWCZYK, H.: Security under key-dependent inputs, in: Proc. Of the 14th ACM Conference on Computer and Communications Security-CCS ’07 (P. Ning et al., eds.), Alexandria, Virginia, USA, 2007, ACM, New York, NY, USA, 2007, pp. 466-475, http://doi.acm.org/10.1145/1315245.1315303.10.1145/1315245.1315303Search in Google Scholar

[HP01] HABER, S.-PINKAS, B.: Securely combining public-key cryptosystems, in: CCS ’01-Computer and Communications Security (P. Samarati, ed.), 8th ACM Conference, Philadelphia, PA, USA, 2001, ACM, New York, 2001, pp. 215-224.10.1145/501983.502013Search in Google Scholar

[HU08] HOFHEINZ, D.-UNRUH, D.: Towards key-dependent message security in the standard model, in: EUROCRYPT ’08-Advances in Cryptology (N. Smart, ed.), 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, 2008, Lecture Notes in Comput. Sci., Vol. 4965, Springer, Berlin, 2008, pp. 108-126.Search in Google Scholar

[Kat09] KATZ, J.: Signature schemes with bounded leakage resilience, Cryptology ePrint Archive:Report 2009/220, May, 2009, http://eprint.iacr.org/2009/220.10.1007/978-3-642-10366-7_41Search in Google Scholar

[VHS09] GONZ´ALEZ VASCO, M. I.-HESS, F.-STEINWANDT, R.: Combined (identity-based) public key schemes, Cryptology ePrint Archive: Report 2008/466, February, 2009, http://eprint.iacr.org/2008/466.Search in Google Scholar

ISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics