Open AccessBook
Advances in Cryptology - CRYPTO '98
Reads0
Chats0
About:
The article was published on 1998-01-01 and is currently open access. It has received 651 citations till now.read more
Citations
More filters
Book ChapterDOI
On the minimal assumptions of group signature schemes
Michel Abdalla,Bogdan Warinschi +1 more
TL;DR: This work shows that the construction of secure group signature schemes based solely on the existence of one-way functions is unlikely, in contrast to what is known for standard signature schemes, which can be constructed from any one- way function.
Book ChapterDOI
Algebraic cryptanalysis of 58-round SHA-1
TL;DR: The aim of this article is to sophisticate and improve Wang's attack by using algebraic techniques and introduce new notions, namely semi-neutral bit and adjuster and propose then an improved message modification technique based ongebraic techniques.
Book ChapterDOI
Observability Analysis - Detecting When Improved Cryptosystems Fail
TL;DR: It is shown that, paradoxically, what looks like a "universal improvement" or a "straight-forward improvement" which enables better security and better reliability on a theoretical level, may in fact, within certain operational contexts, introduce new exposures and attacks, resulting in a weaker operational cryptosystem.
Book ChapterDOI
Confidentiality and integrity: a constructive perspective
TL;DR: This work follows the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions and finds that some are too weak, or artificially strong, such as INT-CTXT, and others appear unsuitable for symmetric encryption,such as IND-CCA.
Book ChapterDOI
On the security models of (threshold) ring signature schemes
Joseph K. Liu,Duncan S. Wong +1 more
TL;DR: This paper shows that the bilinear map based ring signature scheme of Boneh et al.