Public key signatures in the multi-user setting

SD Galbraith, J Malone-Lee, NP Smart

Research output: Contribution to journalArticle (Academic Journal)

31 Citations (Scopus)

Abstract

This paper addresses the security of public key signature schemes in a ""multi-user"" setting. We bound the advantage of an adversary in producing an existential forgery on any one of a set of target public keys by the advantage of an adversary in producing an existential forgery on a single public key for any public key signature algorithm. We then improve the concrete security of this general reduction for certain specific discrete logarithm based signature algorithms such as that of Schnorr.
Translated title of the contributionPublic key signatures in the multi-user setting
Original languageEnglish
Pages (from-to)263 - 266
Number of pages3
JournalInformation Processing Letters
Volume83 (5)
Publication statusPublished - Jun 2002

Fingerprint Dive into the research topics of 'Public key signatures in the multi-user setting'. Together they form a unique fingerprint.

Cite this