Cryptography: Theory and Practice

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: COMS W4995 Introduction to Cryptography October 30, 2003 Lecture 18: Digital Signature Schemes Lecturer: Tal Malkin Scribes: Hua Shuo Cai Summary Definition of Digital Signature scheme. Brief description of Paradox. And construc- tion of Lamport’s One-Time Signature for one bit message. 1 Authenticity How do you know that relieved message is from who you think it is? And that it wasn’t tampered with? Adv can intercept the cipher and change the cipher. We have two authentication schemes : • DigitalSignature- Public Key World. • MessageAuthenticationCode- Private Key World. 2 Digital Signature Definition 1 A Digital Signature Scheme is a triple of algorithms { GEN, SIGN, V ER } such that: • GEN (The key generate algorithm) - a randomized algorithm that on input 1 k outputs ( P K, SK ) . • SIGN (The Signing algorithm)- a (Possibly randomized algorithm) that on in- put SK , m output a signature σ ....
View Full Document

This note was uploaded on 01/30/2008 for the course ICS 268 taught by Professor Jarecki during the Fall '04 term at UC Irvine.

Page1 / 4

Malkin18 - COMS W4995 Introduction to Cryptography Lecture...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online