skip to main content
10.1145/62212.62216acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

How to sign given any trapdoor function

Authors Info & Claims
Published:01 January 1988Publication History

ABSTRACT

We present a digital signature scheme which combines high security with the property of being based on a very general assumption: the existence of trapdoor permutations. Previous signature schemes with comparable levels of security were based on assumptions of the computational hardness of particular algebraic problems such as factoring. Our contribution is to free this important cryptographic primitive from the fortunes of any specific algebraic problem by establishing a truly general signature scheme.

References

  1. BBS.Blum, L., M. EClum, and M. Shu{,, "A Simple Unpredi. ctable Pseudo-Raitdom Number Generator," SiAM Journal on Computing, Vo},. 15, No. 2 (May 1986), 364-383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BM.Blum, M., and S. Micali, "How to Generate Cryptographically S;rong Sequences of Pseudo-Random tilts," SIAM Journal on Computing, Vol. 13, No. 4 (November 1984)850-864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. DH.Diffie, W. and M. E. Hellman, "New Directions in Cryptography," tEEE Trans. Info. Theory IT-22 (November 1976), 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. GM.Goldwasser, S., and S. Micali, "Probabalistic Encryption," Journal of Computer and System Sciences 28 (April 1984), 270-299.Google ScholarGoogle ScholarCross RefCross Ref
  5. GMR.Goldwasser, S., and S. Micali, slid R. RJvest, "A Digital Signature Schenle Secure Against Adaptive Chosen-M~ssage Attacks," to appear in S{AM Journal on Computing, April 1928. (An earlier version appeared as "A Paradoxical Solution to the Signature Problem," Proceedings of the 25th Annual Symposium on the Foundations of C'omputer Science, IEEE (1984), 441-4,18). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. GMY.Goldwasser, S., S. Micali, and A. Yao, "Strong Signature Schemes," Proceedings of the 15th Annual A CM Symposium on the Theory of Computing (Boston, 1983), 431-439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. La.Lamport, L. "Constructing Digital Signatures from a One-V~ray Function," SRI Intl. CSL-98. (October 1979)Google ScholarGoogle Scholar
  8. Le.Levin, L., "One Way l?unctions and Pseudo Random Generators," Proceedings of the 17th Annual ACM Symposium on the Theory of Computing (Providence, 1985), 363-365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M.Merkle, R., "A DigitM Signature Based on a Conventional Encryption F~nction," presented at CRYPTO 87 (August 1987), Santa Barbara. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. RSA.Rivest, R., A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the A CM (Feb 78), 120-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y.Yao, A. C., "Theory and Applications of Trapdoor Functions," Proceedings of the 23rd Annual Symposium on the Foundations of Computer Science, IEEE (1982) 80-91.Google ScholarGoogle Scholar

Index Terms

  1. How to sign given any trapdoor function

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing
          January 1988
          553 pages
          ISBN:0897912640
          DOI:10.1145/62212

          Copyright © 1988 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 1988

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          STOC '88 Paper Acceptance Rate53of192submissions,28%Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader