Abstract
In this talk, we survey: the models of unconditionally secure authentication and signature schemes; and the construction methodology for them. We also propose a construction of the unconditionally secure signature scheme by using universal hash families.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atici, M., Stinson, D.: Universal hashing and multiple authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 16–30. Springer, Heidelberg (1996)
Chaum, D., Roijakkers, S.: Unconditionally secure digital signatures. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 206–214. Springer, Heidelberg (1991)
Safavi-Naini, R., McAven, L., Yung, M.: General group authentication codes and their relation to “unconditionally-secure signatures”. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 231–247. Springer, Heidelberg (2004)
Shikata, J., Hanaoka, G., Zheng, Y., Imai, H.: Security notions for unconditionally secure signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 434–449. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shikata, J. (2009). Construction Methodology of Unconditionally Secure Signature Schemes. In: Desmedt, Y. (eds) Information Theoretic Security. ICITS 2007. Lecture Notes in Computer Science, vol 4883. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10230-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-10230-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10229-5
Online ISBN: 978-3-642-10230-1
eBook Packages: Computer ScienceComputer Science (R0)