summaryrefslogtreecommitdiff
path: root/doc/paper
diff options
context:
space:
mode:
authorJeffrey Burdges <burdges@gnunet.org>2017-11-19 12:23:29 +0100
committerJeffrey Burdges <burdges@gnunet.org>2017-11-19 12:23:29 +0100
commit6d845c951efccb2f44a8aa76d64944e6c42c44b7 (patch)
treef33cbb98edf807c2c74e74084f925ff1ac046446 /doc/paper
parent53be6c633793297c9fae2004fb5ca0c52edd0c33 (diff)
downloadexchange-6d845c951efccb2f44a8aa76d64944e6c42c44b7.tar.gz
exchange-6d845c951efccb2f44a8aa76d64944e6c42c44b7.tar.bz2
exchange-6d845c951efccb2f44a8aa76d64944e6c42c44b7.zip
Add on-more- forgery citation for security proof
Diffstat (limited to 'doc/paper')
-rw-r--r--doc/paper/taler.bib18
1 files changed, 18 insertions, 0 deletions
diff --git a/doc/paper/taler.bib b/doc/paper/taler.bib
index 0b67fa52..a46c9384 100644
--- a/doc/paper/taler.bib
+++ b/doc/paper/taler.bib
@@ -388,6 +388,24 @@ year="2017",
}
+@article{Pointcheval_n_Stern,
+ author="Pointcheval, David and Stern, Jacques",
+ title="Security Arguments for Digital Signatures and Blind Signatures ",
+ journal="Journal of Cryptology",
+ year="2000",
+ month="Jun",
+ day="01",
+ volume="13",
+ number="3",
+ pages="361--396",
+ abstract="Since the appearance of public-key cryptography in the seminal Diffie---Hellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for several years is often considered as a kind of validation procedure. A much more convincing line of research has tried to provide ``provable'' security for cryptographic protocols. Unfortunately, in many cases, provable security is at the cost of a considerable loss in terms of efficiency. Another way to achieve some kind of provable security is to identify concrete cryptographic objects, such as hash functions, with ideal random objects and to use arguments from relativized complexity theory. The model underlying this approach is often called the ``random oracle model.'' We use the word ``arguments'' for security results proved in this model. As usual, these arguments are relative to well-established hard algorithmic problems such as factorization or the discrete logarithm.",
+issn="1432-1378",
+ doi="10.1007/s001450010003",
+ url="https://doi.org/10.1007/s001450010003"
+}
+
+
+
@article{OneMoreInversion,
author="Bellare and Namprempre and Pointcheval and Semanko",
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",