Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A key-exchange system based on imaginary quadratic fields
Journal of Cryptology
An identity-based identification scheme based on discrete logarithms modulo a composite number
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Meta-ElGamal signature schemes
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A course in computational algebraic number theory
A course in computational algebraic number theory
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A One Way Function Based on Ideal Arithmetic in Number Fields
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Design Validations for Discrete Logarithm Based Signature Schemes
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
On diffie-hellman key agreement with short exponents
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Securing Agent Based Architectures
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Algorithms for Multi-exponentiation
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Hi-index | 0.00 |
We present RDSA, a variant of the DSA signature scheme, whose security is based on the intractability of extracting roots in a finite abelian group. We prove that RDSA is secure against an adaptively chosen message attack in the random oracle model if and only if computing roots in the underlying group is intractable. We report on a very efficient implementation of RDSA in the class group of imaginary quadratic orders. We also show how to construct class groups of algebraic number fields of degree 2 in which RDSA can be implemented.