Index Terms
- Machanizing proof: computing, risk, and trust
Recommendations
Proof of plaintext knowledge for code-based public-key encryption revisited
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityIn a recent paper at Asiacrypt'2012, Jain et al point out that Veron code-based identification scheme is not perfect zero-knowledge. In particular, this creates a gap in security arguments of proof of plaintext knowledge (PPK) and verifiable encryption ...
Security Proof for Partial-Domain Hash Signature Schemes
CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in CryptologyWe study the security of partial-domain hash signature schemes, in which the output size of the hash function is only a fraction of the modulus size. We show that for e = 2 (Rabin), partial-domain hash signature schemes are provably secure in the ...
Universal designated verifier ring signature (proof) without random oracles
EUC'06: Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous ComputingThis paper first introduces the concept of universal designated verifier ring signature (UDVRS), which not only allows members of a group to sign messages on behalf of the group without revealing their identities, but also allows any holder of the ...
Comments