LEADER 03761nam 22006375 450 001 996465295103316 005 20200705163451.0 010 $a3-540-68712-2 024 7 $a10.1007/BFb0024619 035 $a(CKB)1000000000234492 035 $a(SSID)ssj0000322631 035 $a(PQKBManifestationID)11247835 035 $a(PQKBTitleCode)TC0000322631 035 $a(PQKBWorkID)10287439 035 $a(PQKB)11546820 035 $a(DE-He213)978-3-540-68712-2 035 $a(PPN)155211218 035 $a(EXLCZ)991000000000234492 100 $a20121227d1996 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Signature Schemes$b[electronic resource] $eGeneral Framework and Fail-Stop Signatures /$fby Birgit Pfitzmann 205 $a1st ed. 1996. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1996. 215 $a1 online resource (XVI, 404 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1100 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-61517-2 327 $aRequirements on digital signature schemes -- History of digital signature schemes -- Information-theoretic security for signers: Introduction -- Terminology -- Properties of digital signature schemes -- Overview of existing schemes with other than ordinary security -- Conventional definitions of fail-stop signature schemes and general reductions -- Building blocks -- Constructions for one message block -- Signing many long messages -- Lower bounds. 330 $aThis book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track. Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1100 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer communication systems 606 $aData Storage Representation$3https://scigraph.springernature.com/ontologies/product-market-codes/I15025 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData structures (Computer science). 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 14$aData Storage Representation. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aPfitzmann$b Birgit$4aut$4http://id.loc.gov/vocabulary/relators/aut$0746237 906 $aBOOK 912 $a996465295103316 996 $aDigital signature schemes$91489236 997 $aUNISA