Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An Efficient Signature Scheme with Fast Online Signing

Full metadata record
DC Field Value Language
dc.contributor.authorYoun, Taek-Young-
dc.contributor.authorPark, Young-Ho-
dc.contributor.authorLim, Jongin-
dc.date.accessioned2021-09-08T12:44:55Z-
dc.date.available2021-09-08T12:44:55Z-
dc.date.created2021-06-11-
dc.date.issued2009-10-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/119141-
dc.description.abstractIn 1999, Gennaro, Halevi and Rabin proposed a signature which achieves provable security without assuming the random oracles, and it is the first RSA-type signature whose security is proved in the standard model. Since that time, several signatures have been proposed to achieve better efficiency or useful property along with the provable security in the standard model. In this paper, we construct a trapdoor hash function, and design an efficient online/online signature by using the trapdoor hash function. Our signature scheme requires only one non-modular multiplication of two small integers for online signing, and it provides the fastest online signing among all online/offline signatures that achieve provable security in the standard model.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSECURE-
dc.titleAn Efficient Signature Scheme with Fast Online Signing-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Jongin-
dc.identifier.doi10.1587/transfun.E92.A.2431-
dc.identifier.scopusid2-s2.0-84883871720-
dc.identifier.wosid000272394500006-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E92A, no.10, pp.2431 - 2437-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE92A-
dc.citation.number10-
dc.citation.startPage2431-
dc.citation.endPage2437-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusSECURE-
dc.subject.keywordAuthoronline/offline signature-
dc.subject.keywordAuthortrapdoor hash function-
dc.subject.keywordAuthorstrong RSA assumption-
dc.subject.keywordAuthordivision intractability-
dc.subject.keywordAuthordiscrete logarithm with short exponent problem-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE