Key Substitution Attacks on Multisignature Schemes
暂无分享,去创建一个
Chun-Hua Chen | Hong Zhang | Bennian Dou | Chungen Xu | Chun-Hua Chen | Bennian Dou | Hong Zhang | Chungen Xu
[1] Alfred Menezes,et al. Another Look at Security Theorems for 1-Key Nested MACs , 2014, Open Problems in Mathematics and Computational Science.
[2] Chun-Hua Chen,et al. Key Substitution Attacks on the CFS Signature , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[3] Thomas Ristenpart,et al. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.
[4] Rainer Steinwandt,et al. Key substitution attacks revisited: Taking into account malicious signers , 2005, International Journal of Information Security.
[5] N. Smart,et al. Security of Signature Schemes in a Multi-User Setting , 2004, Des. Codes Cryptogr..
[6] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[7] Chik How Tan,et al. Key Substitution Attacks on Some Provably Secure Signature Schemes , 2004, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[8] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[9] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..