On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks.
Hiraku MoritaJacob C. N. SchuldtTakahiro MatsudaGoichiro HanaokaTetsu IwataPublished in: ICISC (2015)
Keyphrases
- signature scheme
- private key
- digital signature scheme
- public key
- public key cryptosystem
- standard model
- diffie hellman
- provably secure
- block cipher
- security threats
- blind signature scheme
- security mechanisms
- security analysis
- digital signature
- cryptographic protocols
- chosen message
- security protocols
- blind signature
- secure communication
- designated verifier
- threshold signature scheme
- diffie hellman assumption
- identity based signature
- key distribution
- hash functions
- information security
- secret key
- network security
- signcryption scheme
- security requirements
- security issues
- cca secure
- countermeasures
- access control