Introduction to Cryptography November 2 , 2006 Lecture 20 : Digital Signatures II

نویسنده

  • Tom Roeder
چکیده

In the last lecture, we developed a digital signature scheme for message in {0, 1} n and proved it to be one-time secure. We also showed how to construct a family of Collision-Resistant Hash Functions (CRH) and claimed that they would be useful in constructing one-time secure digital signature schemes for messages in {0, 1} *. The following theorem makes this claim more formally. Theorem 1 If there exists a CRH from {0, 1} * −→ {0, 1} n and there exists a one-way function (OWF), then there exists a one-time secure digital signature scheme for {0, 1} *. Proof. We will only provide a sketch of the proof here.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of ElGamal DSS RSA Elliptic Curves

We began the course with a discussion and review of private key cryptography and then started moving into the realm of public key cryptography. During this lecture, we will discuss four public key schemes. Even though RSA preceded the other schemes presented here, we will review ElGamal and introduce DSS rst (both mod p schemes), in hopes of providing more background and motivation for some of ...

متن کامل

Symplectic Toric Varieties

These are the notes of two lectures given at the Mini Spring School An introduction to the mathematics of string theory held at Adelaide University in November 2002. It is a leisurely introduction to the mathematics surrounding toric varieties. Lecture I. Aims of Lecture I. (i) To contrast topological, Riemannian, symplectic and complex structures; (ii) to set up various topological objects tha...

متن کامل

Lecture 15 - Digital Signatures

Definition of digital signatures. Recall that we had the following picture: Private Key Public Key Secrecy Private Key Encryption Public key Encryption Integrity Message Authentication Codes (MAC) ?? Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike th...

متن کامل

Lecture 13 - Digital Signatures

Definition of digital signatures. Recall that we had the following picture: Private Key Public Key Secrecy Private Key Encryption Public key Encryption Integrity Message Authentication Codes (MAC) ?? Digital signatures complete this picture by giving a public key analog of message authentication codes. Digital signatures were suggested by Diffie and Hellman in their seminal paper, but unlike th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006