Digital Signatures
Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures...
Saved in:
Main Author | |
---|---|
Format | eBook Book |
Language | English |
Published |
New York
Springer Science + Business Media
2010
Springer Springer US |
Edition | 1. Aufl. |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures. Full descriptions, detailed constructions, and formal proofs of security are provided for essentially all known provably-secure signature schemes, state-of-the-art signature schemes used extensively in practice are also explained in detail.A valuable reference book for researchers and industry practitioners, Digital Signatures can also be used as a tutorial for self-study by advanced-level students in computer science, or as a textbook in a seminar on signature schemes. |
---|---|
AbstractList | Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures. Full descriptions, detailed constructions, and formal proofs of security are provided for essentially all known provably-secure signature schemes, state-of-the-art signature schemes used extensively in practice are also explained in detail.A valuable reference book for researchers and industry practitioners, Digital Signatures can also be used as a tutorial for self-study by advanced-level students in computer science, or as a textbook in a seminar on signature schemes. This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides the reader with a better understanding of the security guarantees provided by digital signatures. |
Author | Katz, Jonathan |
Author_xml | – sequence: 1 fullname: Katz, Jonathan |
BackLink | https://cir.nii.ac.jp/crid/1130282269665999872$$DView record in CiNii |
BookMark | eNo1UD1PwzAQNeJDtKULGxtCiC3UPsd2boRSPqRKDCBWy7GdylAciNOBf4_bwA13uqf3nu7dmBzENnpCzhi9ZpSqGaqqoAWvVAFKMSjUHplmjGZkB6h9Mv5fGD0iI1kiUoXAj8k0pXeaq2QCOY7I6V1Yhd6sz1_CKpp-0_l0Qg4bs05--jcn5O1-8Tp_LJbPD0_zm2VhBIV8Ql0L8A1kZ2aBG4ZomffgXQm8lo1zVjLugDmuFKdGlYY3rHLCYmk9ippPyGwwTl9diCvf6bptP5JmVG9z6pxJU52D6F0srbLialB8de33xqde-63E-th3Zq0Xt3NJASVk4uVAjCFoG7adMU6hApAopUDE_J9MuxhoNpjoWp3v-DTdjx5WECAqwX8BSsxlXw |
ContentType | eBook Book |
Copyright | Springer Science+Business Media, LLC 2010 |
Copyright_xml | – notice: Springer Science+Business Media, LLC 2010 |
DBID | 08O RYH |
DEWEY | 005.82 |
DOI | 10.1007/978-0-387-27712-7 |
DatabaseName | ciando eBooks CiNii Complete |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Mathematics |
EISBN | 9780387277127 0387277129 |
Edition | 1. Aufl. 1 |
ExternalDocumentID | 108198 EBC602962 BB02521934 ciando252585 |
GroupedDBID | -T. 089 08O 0D6 0DA 0E8 20A 4UP 4V3 92K A4J AAJYQ AATVQ AAUKK ABBUY ABCYT ABMKK ABMNI ACBPT ACDTA ACDUY ACWCF ACZTO ADVHH AEHEY AEJLV AEKFX AEOKE AETDV AEZAY AHNNE AHSMR ALMA_UNASSIGNED_HOLDINGS ATJMZ CZZ E6I I4C IEZ MYL SBO TBMHI TPJZQ UR3 Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z88 RYH 38. |
ID | FETCH-LOGICAL-a50278-bb52ef29071c23a199c1ee2ed423b6fddc613d21d37730a74a3f18d5c94ce95b3 |
ISBN | 0387277110 9780387277110 9781489998811 1489998810 |
IngestDate | Tue Jul 29 20:33:18 EDT 2025 Fri May 30 21:22:31 EDT 2025 Thu Jun 26 22:03:50 EDT 2025 Mon Jun 30 04:00:19 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | Computer Informatik |
LCCallNum_Ident | QA268 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a50278-bb52ef29071c23a199c1ee2ed423b6fddc613d21d37730a74a3f18d5c94ce95b3 |
OCLC | 649907923 |
PQID | EBC602962 |
PageCount | 197 |
ParticipantIDs | springer_books_10_1007_978_0_387_27712_7 proquest_ebookcentral_EBC602962 nii_cinii_1130282269665999872 ciando_primary_ciando252585 |
PublicationCentury | 2000 |
PublicationDate | 2010 c2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: New York, NY – name: Boston, MA |
PublicationYear | 2010 |
Publisher | Springer Science + Business Media Springer Springer US |
Publisher_xml | – name: Springer Science + Business Media – name: Springer – name: Springer US |
SSID | ssj0000415939 ssib023921451 ssib017113987 |
Score | 2.3234065 |
Snippet | Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature... This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides... |
SourceID | springer proquest nii ciando |
SourceType | Publisher |
SubjectTerms | Coding and Information Theory Communications Engineering, Networks Computer Communication Networks Computer Science Computer Systems Organization and Communication Networks Cryptology Data Structures and Information Theory Electronic commerce |
TableOfContents | 8.3.3 The Micali/Ong-Schnorr Scheme -- 8.3.4 The Schnorr Scheme -- 8.4 Further Reading -- References -- Index 3.3 Signatures from One-Way Functions -- 3.3.1 Putting the Pieces Together -- 3.3.2 Thoughts on the Construction -- 3.4 Further Reading -- Chapter 4Signature Schemes Based on the (Strong) RSAAssumption -- 4.1 Introduction -- 4.1.1 Technical Preliminaries -- 4.1.2 Outline of the Chapter -- 4.2 Signature Schemes Based on the RSA Assumption -- 4.2.1 The Dwork-Naor Scheme -- 4.2.2 The Cramer-Damg°ard Scheme -- 4.2.3 The Hohenberger-Waters Scheme -- 4.3 Schemes Based on the Strong RSA Assumption -- 4.3.1 The Strong RSA Assumption -- 4.3.2 Security Against Known-Message Attacks -- 4.3.3 The Cramer-Shoup Scheme -- 4.3.4 The Fischlin Scheme -- 4.3.5 The Gennaro-Halevi-Rabin Scheme -- 4.4 Further Reading -- Chapter 5 Constructions Based on Bilinear Maps -- 5.1 Introduction -- 5.1.1 Technical Preliminaries -- 5.1.2 Outline of the Chapter -- 5.2 The Boneh-Boyen Scheme -- 5.3 The Waters Scheme -- 5.4 Further Reading -- Part IIIDigital Signature Schemes in theRandom Oracle Model -- Chapter 6 The Random Oracle Model -- 6.1 Security Proofs in the Random Oracle Model -- 6.2 Is the Random Oracle Methodology Sound? -- 6.2.1 Negative Results -- 6.3 The Random Oracle Model in Practice -- 6.4 Further Reading -- Chapter 7Full-Domain Hash (and Related) SignatureSchemes -- 7.1 The Full-Domain Hash (FDH) Signature Scheme -- 7.1.1 An Instantiation Using Bilinear Maps -- 7.2 An Improved Security Reduction for FDH -- 7.3 Probabilistic FDH -- 7.4 A Simpler Variant with a Tight Reduction -- 7.5 Further Reading -- Chapter 8Signature Schemes from Identification Schemes -- 8.1 Identification Schemes -- 8.2 From Identification Schemes to Signatures -- 8.2.1 The Fiat-Shamir Transform -- 8.2.2 Two Useful Criteria -- 8.2.3 One-Time Signature Schemes without Random Oracles -- 8.3 Some Secure Identification Schemes -- 8.3.1 The Fiat-Shamir Scheme -- 8.3.2 The Guillou-Quisquater Scheme Intro -- Digital Signatures -- Preface -- Contents -- Part ISetting the Stage -- Chapter 1Digital Signatures: Background and Definitions -- 1.1 Digital Signature Schemes: A Quick Introduction -- 1.1.1 Properties of Digital Signatures -- 1.2 Computational Security -- 1.2.1 Computational Notions of Security -- 1.2.2 Notation -- 1.3 Defining Signature Schemes -- 1.4 Motivating the Definitions of Security -- 1.5 Formal Definitions of Security -- 1.5.1 Security against Random-Message Attacks -- 1.5.2 Security against Known-Message Attacks -- 1.5.3 Security against Adaptive Chosen-Message Attacks -- 1.6 Relations Between the Notions -- 1.7 Achieving CMA-Security fromWeaker Primitives -- 1.7.1 CMA-Security from RMA-security -- 1.7.2 CMA-Security from KMA-Security -- 1.8 From Unforgeability to Strong Unforgeability -- 1.9 Extending the Message Length -- 1.10 Further Reading -- Chapter 2Cryptographic Hardness Assumptions -- 2.1 "Generic" Cryptographic Assumptions -- 2.1.1 One-Way Functions and Permutations -- 2.1.2 Trapdoor Permutations -- 2.1.3 Clawfree (Trapdoor) Permutations -- 2.2 Specific Assumptions -- 2.2.1 Hardness of Factoring -- 2.2.2 The RSA Assumption -- 2.2.3 The Discrete Logarithm Assumption -- 2.3 Hash Functions -- 2.3.1 Definitions -- 2.3.2 The Merkle-Damg°ard Transform -- 2.3.3 Constructing Collision-Resistant Hash Functions -- 2.3.4 Constructing Universal One-Way Hash Functions -- 2.4 Applications of Hash Functions to Signature Schemes -- 2.4.1 Increasing the Message Length -- 2.4.2 Reducing the Public-Key Length -- 2.5 Further Reading -- Part IIDigital Signature Schemes withoutRandom Oracles -- Chapter 3Constructions Based on General Assumptions -- 3.1 Lamport's One-Time Signature Scheme -- 3.2 Signatures from One-Time Signatures -- 3.2.1 "Chain-Based" Signatures -- 3.2.2 "Tree-Based" Signatures -- 3.2.3 A Stateless Solution |
Title | Digital Signatures |
URI | http://ebooks.ciando.com/book/index.cfm/bok_id/252585 https://cir.nii.ac.jp/crid/1130282269665999872 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=602962 http://link.springer.com/10.1007/978-0-387-27712-7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9swGDalXHYa3ZjW8bEedpiEMtVxHNdHWhUhtHFiVW9W_DX1UhBkmsSv53HiJC0goXGxasuqledNXj-v3w8T8m1ivdVAPxH4DJPMpS6RDt-Vya0pbG4Z8yHf-ddVfvE7u1zyZW_n32Z2Sal_mIcX80reIlWMQa4hS_Y_JNv-KQbwG_JFCwmjfUJ-224Z41j-hMs-TkP0RVWZs3PJFNUFre2p-KZVXwWHbVr1zanelrUXPM2pELSOA32m-7pwh7pibpgK9twp-jb8bjoF04GqYtku2RUCymDvbH75c9EeToW8fclk9G7Xa8ZqRW2_cRFvVemNa2I7D2cy9gY79nq12mLvTxzO1T5-vU_6IbdjQHpu_YG8b260GEUF95EMIrCjDtgDsjifX88uknhrRFLw4EZNtOap8ymsfmpSVlApDXV4CS2Yo869tQYUxqbUMgH1VoisYJ5OLDcyM05yzT6R_vpm7T6TkTeFHnPPtfegMsVYWs4CSzQpdRPqxZAc1s-pbuvaIKruAl2YYUNyjIfHUGhp8BCDjeWwLzlYOWAckq8NLKpyjcd4XDWfzvJxKnPM-N6gpcKEe9VUmQbkaqwAuaogV-LLK4sdknfde3ZE-uXdX3cMPlXqkyj9RyNaEHo |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Digital+signatures&rft.au=Katz%2C+Jonathan&rft.date=2010-01-01&rft.pub=Springer&rft.isbn=9780387277110&rft_id=info:doi/10.1007%2F978-0-387-27712-7&rft.externalDocID=BB02521934 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-0-387-27712-7 |