Bellare and Miner also presented a method for constructing such schemes without the use of the random oracle. We conclude by proposing an improvement to their method and an additional, new method for accomplishing this.
Category / Keywords: foundations / forward security, digital signatures, proven security, concrete security Publication Info: The extended abstract of this work appears in Advances in Cryptology --- Asiacrypt 2000, Tatsuaki Okamoto, editor, Lecture Notes in Computer Science, Springer-Verlag, 2000, IACR. Date: received 6 Mar 2000, revised 14 Sep 2000 Contact author: mabdalla at cs ucsd edu Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20000914:074729 (All versions of this report) Short URL: ia.cr/2000/002 Discussion forum: Show discussion | Start new discussion