How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Emmanuel BressonBenoît Chevallier-MamesChristophe ClavierAline GougetPascal PaillierThomas PeyrinPublished in: ProvSec (2008)
Keyphrases
- hash functions
- signature scheme
- digital signature scheme
- public key cryptosystem
- provably secure
- diffie hellman
- blind signature
- public key
- private key
- identity based signature
- standard model
- stream cipher
- encryption scheme
- digital signature
- similarity search
- secret key
- blind signature scheme
- key distribution
- authentication protocol
- designated verifier
- threshold signature scheme
- bilinear pairings
- electronic voting
- block cipher
- security model
- identity based cryptography
- group signature scheme
- public key cryptography
- hamming distance
- security analysis
- information security
- data distribution
- secure communication
- security issues
- cca secure
- hamming space
- signcryption scheme
- multi dimensional