Lecture 13 Many-time Signatures 1 One-time Signatures

نویسندگان

  • Chris Peikert
  • Anand Louis
چکیده

Constructing a scheme that satisfies such a strong security notion is very involved, so we start with an easier goal: unforgeability under a one-time chosen-message attack (uf-1cma). The definition is syntactically identical to the one above, but F is restricted to make (at most) one query to its signing oracle. Here we describe Lamport’s one-time signature scheme OTS for messages of length ` = poly(n), which is based on a one-way function f :

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Expression Profiling of Microarray Gene Signatures in Acute and Chronic Myeloid Leukaemia in Human Bone Marrow

Background Classification of cancer subtypes by means of microarray signatures is becoming increasingly difficult to ignore as a potential to transform pathological diagnosis nonetheless, measurement of Indicator genes in routine practice appears to be arduous. In a preceding published study, we utilized real-time PCR measurement of Indicator genes in acute lymphoid leukaemia (ALL) and acute m...

متن کامل

Introduction to Cryptography November 2 , 2006 Lecture 20 : Digital Signatures II

In the last lecture, we developed a digital signature scheme for message in {0, 1} n and proved it to be one-time secure. We also showed how to construct a family of Collision-Resistant Hash Functions (CRH) and claimed that they would be useful in constructing one-time secure digital signature schemes for messages in {0, 1} *. The following theorem makes this claim more formally. Theorem 1 If t...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

Parametrization of Pedestrian Injuries and its Utilisation in Proving Traffic Accidents Course Using Injury Signatures and Contact Signatures

Background: The paper points out the present limited possibility of using the verbal description of injuries for the needs of experts from the field of road transportation as relevant criminalistics traces, as well as the options of the FORTIS system that creates a new area for a deeper interdisciplinary approach in the field of expert evidence. Further a description of how to create injury si...

متن کامل

Cs 255 Notes

1. Overview and The One-Time Pad: 1/7/2013 1 2. Pseudorandom Generators: 1/9/2013 3 Week 1 Videos: History of Cryptography and Discrete Probability 5 3. More Stream Ciphers : 1/14/2013 7 4. Block Ciphers : 1/16/2013 9 5. Section 1: Getting Started With Javascript, taught by Lucas Garron: 1/18/2013 11 6. AES: 1/23/2013 12 7. More PRFs and PRPs: 1/28/2013 13 8. Message Authentication Codes: 1/30/...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010