G (key-generator) generates a public key ( pk), and a corresponding private key ( sk), on input 1 n, where n is the security parameter.S (signing) returns a tag, t, on the inputs: the private key ( sk), and a string ( x).V (verifying) outputs accepted or rejected on the inputs: the public key ( pk), a string ( x), and a tag ( t).Ī digital signature scheme is secure if for every non-uniform probabilistic polynomial time adversary, A Pr [ ( pk, sk) ← G(1 n), ( x, t) ← A S( sk,.) denotes that A has access to the oracle, S( sk.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |