Digital Signatures

Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures...

Full description

Saved in:
Bibliographic Details
Main Author Katz, Jonathan
Format eBook Book
LanguageEnglish
Published New York Springer Science + Business Media 2010
Springer
Springer US
Edition1. Aufl.
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures. Full descriptions, detailed constructions, and formal proofs of security are provided for essentially all known provably-secure signature schemes, state-of-the-art signature schemes used extensively in practice are also explained in detail.A valuable reference book for researchers and industry practitioners, Digital Signatures can also be used as a tutorial for self-study by advanced-level students in computer science, or as a textbook in a seminar on signature schemes.
AbstractList Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature schemes being utilized today. This book will help the reader understand and appreciate the security guarantees provided by digital signatures. Full descriptions, detailed constructions, and formal proofs of security are provided for essentially all known provably-secure signature schemes, state-of-the-art signature schemes used extensively in practice are also explained in detail.A valuable reference book for researchers and industry practitioners, Digital Signatures can also be used as a tutorial for self-study by advanced-level students in computer science, or as a textbook in a seminar on signature schemes.
This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides the reader with a better understanding of the security guarantees provided by digital signatures.
Author Katz, Jonathan
Author_xml – sequence: 1
  fullname: Katz, Jonathan
BackLink https://cir.nii.ac.jp/crid/1130282269665999872$$DView record in CiNii
BookMark eNo1UD1PwzAQNeJDtKULGxtCiC3UPsd2boRSPqRKDCBWy7GdylAciNOBf4_bwA13uqf3nu7dmBzENnpCzhi9ZpSqGaqqoAWvVAFKMSjUHplmjGZkB6h9Mv5fGD0iI1kiUoXAj8k0pXeaq2QCOY7I6V1Yhd6sz1_CKpp-0_l0Qg4bs05--jcn5O1-8Tp_LJbPD0_zm2VhBIV8Ql0L8A1kZ2aBG4ZomffgXQm8lo1zVjLugDmuFKdGlYY3rHLCYmk9ippPyGwwTl9diCvf6bptP5JmVG9z6pxJU52D6F0srbLialB8de33xqde-63E-th3Zq0Xt3NJASVk4uVAjCFoG7adMU6hApAopUDE_J9MuxhoNpjoWp3v-DTdjx5WECAqwX8BSsxlXw
ContentType eBook
Book
Copyright Springer Science+Business Media, LLC 2010
Copyright_xml – notice: Springer Science+Business Media, LLC 2010
DBID 08O
RYH
DEWEY 005.82
DOI 10.1007/978-0-387-27712-7
DatabaseName ciando eBooks
CiNii Complete
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Mathematics
EISBN 9780387277127
0387277129
Edition 1. Aufl.
1
ExternalDocumentID 108198
EBC602962
BB02521934
ciando252585
GroupedDBID -T.
089
08O
0D6
0DA
0E8
20A
4UP
4V3
92K
A4J
AAJYQ
AATVQ
AAUKK
ABBUY
ABCYT
ABMKK
ABMNI
ACBPT
ACDTA
ACDUY
ACWCF
ACZTO
ADVHH
AEHEY
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHNNE
AHSMR
ALMA_UNASSIGNED_HOLDINGS
ATJMZ
CZZ
E6I
I4C
IEZ
MYL
SBO
TBMHI
TPJZQ
UR3
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z88
RYH
38.
ID FETCH-LOGICAL-a50278-bb52ef29071c23a199c1ee2ed423b6fddc613d21d37730a74a3f18d5c94ce95b3
ISBN 0387277110
9780387277110
9781489998811
1489998810
IngestDate Tue Jul 29 20:33:18 EDT 2025
Fri May 30 21:22:31 EDT 2025
Thu Jun 26 22:03:50 EDT 2025
Mon Jun 30 04:00:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Keywords Computer Informatik
LCCallNum_Ident QA268
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a50278-bb52ef29071c23a199c1ee2ed423b6fddc613d21d37730a74a3f18d5c94ce95b3
OCLC 649907923
PQID EBC602962
PageCount 197
ParticipantIDs springer_books_10_1007_978_0_387_27712_7
proquest_ebookcentral_EBC602962
nii_cinii_1130282269665999872
ciando_primary_ciando252585
PublicationCentury 2000
PublicationDate 2010
c2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: New York, NY
– name: Boston, MA
PublicationYear 2010
Publisher Springer Science + Business Media
Springer
Springer US
Publisher_xml – name: Springer Science + Business Media
– name: Springer
– name: Springer US
SSID ssj0000415939
ssib023921451
ssib017113987
Score 2.3234065
Snippet Digital Signatures is the first and only book to explain the underlying cryptographic principles and techniques used in designing the secure digital signature...
This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides...
SourceID springer
proquest
nii
ciando
SourceType Publisher
SubjectTerms Coding and Information Theory
Communications Engineering, Networks
Computer Communication Networks
Computer Science
Computer Systems Organization and Communication Networks
Cryptology
Data Structures and Information Theory
Electronic commerce
TableOfContents 8.3.3 The Micali/Ong-Schnorr Scheme -- 8.3.4 The Schnorr Scheme -- 8.4 Further Reading -- References -- Index
3.3 Signatures from One-Way Functions -- 3.3.1 Putting the Pieces Together -- 3.3.2 Thoughts on the Construction -- 3.4 Further Reading -- Chapter 4Signature Schemes Based on the (Strong) RSAAssumption -- 4.1 Introduction -- 4.1.1 Technical Preliminaries -- 4.1.2 Outline of the Chapter -- 4.2 Signature Schemes Based on the RSA Assumption -- 4.2.1 The Dwork-Naor Scheme -- 4.2.2 The Cramer-Damg°ard Scheme -- 4.2.3 The Hohenberger-Waters Scheme -- 4.3 Schemes Based on the Strong RSA Assumption -- 4.3.1 The Strong RSA Assumption -- 4.3.2 Security Against Known-Message Attacks -- 4.3.3 The Cramer-Shoup Scheme -- 4.3.4 The Fischlin Scheme -- 4.3.5 The Gennaro-Halevi-Rabin Scheme -- 4.4 Further Reading -- Chapter 5 Constructions Based on Bilinear Maps -- 5.1 Introduction -- 5.1.1 Technical Preliminaries -- 5.1.2 Outline of the Chapter -- 5.2 The Boneh-Boyen Scheme -- 5.3 The Waters Scheme -- 5.4 Further Reading -- Part IIIDigital Signature Schemes in theRandom Oracle Model -- Chapter 6 The Random Oracle Model -- 6.1 Security Proofs in the Random Oracle Model -- 6.2 Is the Random Oracle Methodology Sound? -- 6.2.1 Negative Results -- 6.3 The Random Oracle Model in Practice -- 6.4 Further Reading -- Chapter 7Full-Domain Hash (and Related) SignatureSchemes -- 7.1 The Full-Domain Hash (FDH) Signature Scheme -- 7.1.1 An Instantiation Using Bilinear Maps -- 7.2 An Improved Security Reduction for FDH -- 7.3 Probabilistic FDH -- 7.4 A Simpler Variant with a Tight Reduction -- 7.5 Further Reading -- Chapter 8Signature Schemes from Identification Schemes -- 8.1 Identification Schemes -- 8.2 From Identification Schemes to Signatures -- 8.2.1 The Fiat-Shamir Transform -- 8.2.2 Two Useful Criteria -- 8.2.3 One-Time Signature Schemes without Random Oracles -- 8.3 Some Secure Identification Schemes -- 8.3.1 The Fiat-Shamir Scheme -- 8.3.2 The Guillou-Quisquater Scheme
Intro -- Digital Signatures -- Preface -- Contents -- Part ISetting the Stage -- Chapter 1Digital Signatures: Background and Definitions -- 1.1 Digital Signature Schemes: A Quick Introduction -- 1.1.1 Properties of Digital Signatures -- 1.2 Computational Security -- 1.2.1 Computational Notions of Security -- 1.2.2 Notation -- 1.3 Defining Signature Schemes -- 1.4 Motivating the Definitions of Security -- 1.5 Formal Definitions of Security -- 1.5.1 Security against Random-Message Attacks -- 1.5.2 Security against Known-Message Attacks -- 1.5.3 Security against Adaptive Chosen-Message Attacks -- 1.6 Relations Between the Notions -- 1.7 Achieving CMA-Security fromWeaker Primitives -- 1.7.1 CMA-Security from RMA-security -- 1.7.2 CMA-Security from KMA-Security -- 1.8 From Unforgeability to Strong Unforgeability -- 1.9 Extending the Message Length -- 1.10 Further Reading -- Chapter 2Cryptographic Hardness Assumptions -- 2.1 "Generic" Cryptographic Assumptions -- 2.1.1 One-Way Functions and Permutations -- 2.1.2 Trapdoor Permutations -- 2.1.3 Clawfree (Trapdoor) Permutations -- 2.2 Specific Assumptions -- 2.2.1 Hardness of Factoring -- 2.2.2 The RSA Assumption -- 2.2.3 The Discrete Logarithm Assumption -- 2.3 Hash Functions -- 2.3.1 Definitions -- 2.3.2 The Merkle-Damg°ard Transform -- 2.3.3 Constructing Collision-Resistant Hash Functions -- 2.3.4 Constructing Universal One-Way Hash Functions -- 2.4 Applications of Hash Functions to Signature Schemes -- 2.4.1 Increasing the Message Length -- 2.4.2 Reducing the Public-Key Length -- 2.5 Further Reading -- Part IIDigital Signature Schemes withoutRandom Oracles -- Chapter 3Constructions Based on General Assumptions -- 3.1 Lamport's One-Time Signature Scheme -- 3.2 Signatures from One-Time Signatures -- 3.2.1 "Chain-Based" Signatures -- 3.2.2 "Tree-Based" Signatures -- 3.2.3 A Stateless Solution
Title Digital Signatures
URI http://ebooks.ciando.com/book/index.cfm/bok_id/252585
https://cir.nii.ac.jp/crid/1130282269665999872
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=602962
http://link.springer.com/10.1007/978-0-387-27712-7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9swGDalXHYa3ZjW8bEedpiEMtVxHNdHWhUhtHFiVW9W_DX1UhBkmsSv53HiJC0goXGxasuqledNXj-v3w8T8m1ivdVAPxH4DJPMpS6RDt-Vya0pbG4Z8yHf-ddVfvE7u1zyZW_n32Z2Sal_mIcX80reIlWMQa4hS_Y_JNv-KQbwG_JFCwmjfUJ-224Z41j-hMs-TkP0RVWZs3PJFNUFre2p-KZVXwWHbVr1zanelrUXPM2pELSOA32m-7pwh7pibpgK9twp-jb8bjoF04GqYtku2RUCymDvbH75c9EeToW8fclk9G7Xa8ZqRW2_cRFvVemNa2I7D2cy9gY79nq12mLvTxzO1T5-vU_6IbdjQHpu_YG8b260GEUF95EMIrCjDtgDsjifX88uknhrRFLw4EZNtOap8ymsfmpSVlApDXV4CS2Yo869tQYUxqbUMgH1VoisYJ5OLDcyM05yzT6R_vpm7T6TkTeFHnPPtfegMsVYWs4CSzQpdRPqxZAc1s-pbuvaIKruAl2YYUNyjIfHUGhp8BCDjeWwLzlYOWAckq8NLKpyjcd4XDWfzvJxKnPM-N6gpcKEe9VUmQbkaqwAuaogV-LLK4sdknfde3ZE-uXdX3cMPlXqkyj9RyNaEHo
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Digital+signatures&rft.au=Katz%2C+Jonathan&rft.date=2010-01-01&rft.pub=Springer&rft.isbn=9780387277110&rft_id=info:doi/10.1007%2F978-0-387-27712-7&rft.externalDocID=BB02521934
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-0-387-27712-7