The security of the code-based signature scheme based on the stern identification protocol

The paper provides a complete description of the digital signature scheme based on the Stern identication protocol. We also present the proof of the existential unforgeability of the scheme under the chosen message attack (EUF-CMA) in the random oracle model (ROM). Finally, we discuss the choice of...

Full description

Bibliographic Details
Published in:Прикладная дискретная математика № 57. С. 67-90
Main Author: Vysotskaya, V. V.
Other Authors: Chizhov, I. V.
Format: Article
Language:English
Subjects:
Online Access:http://vital.lib.tsu.ru/vital/access/manager/Repository/koha:000900669
Перейти в каталог НБ ТГУ