Elsevier

Information Processing Letters

Volume 83, Issue 5, 15 September 2002, Pages 263-266
Information Processing Letters

Public key signatures in the multi-user setting

https://doi.org/10.1016/S0020-0190(01)00338-6Get rights and content

Abstract

This paper addresses the security of public key signature schemes in a “multi-user” setting. We bound the advantage of an adversary in producing an existential forgery on any one of a set of target public keys by the advantage of an adversary in producing an existential forgery on a single public key for any public key signature algorithm. We then improve the concrete security of this general reduction for certain specific discrete logarithm based signature algorithms such as that of Schnorr.

References (6)

  • M. Bellare et al.

    Public-key encryption in a multi-user setting: Security proofs and improvements

  • M. Bellare et al.

    The exact security of digital signatures—How to sign with RSA and Rabin

  • R. Cramer et al.

    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

There are more references available in the full text version of this article.

Cited by (41)

  • Generalized public-key cryptography with tight security

    2019, Information Sciences
    Citation Excerpt :

    The models consider more realistic threats in practice, where the adversary receives multiple public keys and chooses one as the challenge public key. The security models of signature and public-key encryption (PKE) schemes in the multi-user setting were introduced in [13] and [7], respectively. The security models in the multi-user setting with corruptions (MU-C) give the adversary more powerful capabilities.

  • Efficient multi-party concurrent signature from lattices

    2016, Information Processing Letters
    Citation Excerpt :

    Owing to the feature, concurrent signature schemes are useful in some actual settings including contract signing. Along with the work of Chen et al., some related researches are proposed in recent years [2–12], the above work mainly consists of two-user setting or multi-user setting. Mu et al. [2] and Chow et al. [3] proposed two perfect concurrent signature schemes.

  • Limits in the Provable Security of ECDSA Signatures

    2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
  • Security Analysis of RSA-BSSA

    2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
View all citing articles on Scopus
View full text