Problem 1 : Fun with Digital Signatures
نویسنده
چکیده
Scheme 2: Σ(M) = (σ(1 ◦m1), σ(2 ◦m2), . . . , σ(n ◦mn)), where each index i is represented using dlog2(n+ 1)e bits. 3. Choose the smallest n such that d2 log2(n+ 1) + |M | n e ≤ k. (Assume that |M | is small enough and k is large enough to make this is possible.) Then break M up into M = m1 ◦ . . . ◦mn, where each mi is such that |mi| = k − d2log2(n+ 1)e, and mn is padded with 0s as necessary. Scheme 3: Σ(M) = (σ(n ◦ 1 ◦ m1), σ(n ◦ 2 ◦ m2), . . . , σ(n ◦ n ◦ mn)), where each index is represented using dlog2(n+ 1)e bits.
منابع مشابه
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملPrivacy Protecting Protocols for Revocable Digital Signatures
Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted)...
متن کاملA Survey of ESIGN: State of the Art and Proof of Security
RSA, ESIGN, cryptography, digital signature, encryption, decryption, factoring RSA [1] generates digital signatures and cipher text, S, by performing exponentiation on a message, M, to the e-th power of the form M mod(n), where n is based on large prime numbers. RSA has been proven to be fundamentally secure, given the complexity of the e-th root mod(n) problem that RSA presents. Unfortunately,...
متن کاملEfficient Unconditionally Secure Digital Signatures
Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of secret and public keys than a tradi...
متن کاملResearch Issues and Challenges for Multiple Digital Signatures
In this paper, we surveyed several well-known batch verification multiple digital signatures. These schemes can batch verify multiple digital signatures which need only one verification instead of t verifications. However, a number of weaknesses of these schemes are pointed out. According to our proposed issues and challenges, we compared and analyzed them. To sum up these schemes, a secure and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016