Chapter PDF
Similar content being viewed by others
References
M. Abdalla AND L. Reyzin. A new forward-secure digital signature scheme. Advances in Cryptology-ASIACRYPT’ 00, Lecture Notes in Computer Science Vol. 1976, T. Okamoto ed., Springer-Verlag, 2000.
M. Bellare, C. Namprempre, D. Pointcheval AND M. Semanko. The One-More-RSA-Inversion problems and the security of Chaum’s blind signature scheme. Cryptology ePrint Archive: Report 2001/002, http://eprint.iacr.org/2001/002/. Preliminary version, entitled “The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme,” in Financial Cryptography’ 01, Lecture Notes in Computer Science Vol. 2339, P. Syverson ed., Springer-Verlag, 2001.
M. Bellare AND G. Neven. Transitive signatures based on factoring and RSA. Full version of this abstract, available via http://www-cse.ucsd.edu/users/mihir.
M. Bellare AND A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Advances in Cryptology-CRYPTO’ 02, Lecture Notes in Computer Science Vol. 2442, M. Yung ed., Springer-Verlag, 2002.
M. Bellare AND P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the 1st Annual Conference on Computer and Communications Security, ACM, 1993.
S. Chari, T. Rabin AND R. Rivest. An efficient signature scheme for route aggregation. Manuscript, February 2002. http://theory.lcs.mit.edu/~rivest/publications.html.
D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology-CRYTPO 82 Proceedings, D. Chaum, R. Rivest and A. Sherman eds., Plenum Press.
O. Goldreich, S. Goldwasser AND S. Micali. How to construct random functions. Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210–217.
S. Goldwasser, S. Micali AND R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281–308.
L. Guillou AND J. J. Quisquater. A “paradoxical” identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology-CRYPTO’ 88, Lecture Notes in Computer Science Vol. 403, S. Goldwasser ed., Springer-Verlag, 1988.
R. Johnson, D. Molnar, D. Song AND D. Wagner. Homomorphic signature schemes. Topics in Cryptology-CT-RSA’ 02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
S. Micali AND R. Rivest. Transitive signature schemes. Topics in Cryptology-CT-RSA’ 02, Lecture Notes in Computer Science Vol. 2271, B. Preneel ed., Springer-Verlag, 2002.
S. Micali AND L. Reyzin. Improving the exact security of digital signature schemes. Journal of Cryptology, Vol. 15, Number 1, 2002, pp. 1–18.
R. Rivest. Two signature schemes. Slides from talk given at Cambridge University, October 17, 2000. http://theory.lcs.mit.edu/~rivest/publications.html.
R. Steinfeld, L. Bull AND Y. Zheng. Content Extraction Signatures. Information Security and Cryptology-ICISC 2001, Lecture Notes in Computer Science Vol. 2288, K. Kim ed., Springer-Verlag, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bellare, M., Neven, G. (2002). Transitive Signatures Based on Factoring and RSA. In: Zheng, Y. (eds) Advances in Cryptology — ASIACRYPT 2002. ASIACRYPT 2002. Lecture Notes in Computer Science, vol 2501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36178-2_25
Download citation
DOI: https://doi.org/10.1007/3-540-36178-2_25
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00171-3
Online ISBN: 978-3-540-36178-7
eBook Packages: Springer Book Archive