Questions tagged [message-recovery]
Message recovery is a feature of some digital signature schemes, whereas some or all of the message signed is embedded in the signature, recovered as part of signature verification, and thus needs not be transmitted.
26 questions
0
votes
0
answers
38
views
Can someone decipher this supposed pigpen or rosicrucian cipher? [closed]
https://imgur.com/a/ErHmTPz
There are more variations than the one present in the image, but the most used letters are certainly present. I tried letter frequency, word searching. The plain text ...
2
votes
2
answers
154
views
Can signer identity be recovered from a signature in ML-DSA (FIPS 204)? If not, is there any PQC signature scheme that supports this?
I have been reviewing the FIPS 204 draft specification for the ML-DSA (Module-Lattice-based Digital Signature Algorithm), which is part of NIST’s Post-Quantum Cryptography (PQC) standardization effort....
1
vote
0
answers
106
views
Single ecdsa signature valid for two different messages
I have been reading Flaws in Applying Proof Methodologies to Signature Schemes and ran into a bit I do not understand.
In section 4.2 the authors describe a scheme where a malicious signer crafts a ...
3
votes
1
answer
134
views
What is the modern terminology for a digital signature scheme with a shadow?
In Guillou and Quisquater's 1988 paper "A 'Paradoxical' Indentity-Based Signature Scheme Resulting from Zero-Knowledge", they say that an RSA identity has a shadow and go on to state that ...
0
votes
1
answer
189
views
How to understand the argument “if the adversary outputs x then it queries (a, x) to oracle”?
When I read Fixing Cracks in the Concrete:
Random Oracles with Auxiliary Input, Revisited by Dodis et al., it looks as if I have encountered a simple logical bug. (I'm not concerned with the details ...
4
votes
2
answers
389
views
Signature check decrypts ciphertext
Can somebody lead me to existing literature on making the extraction of plaintext dependent on a valid signature check first? I didn't think it was possible to force signatures to be checked; but this ...
1
vote
2
answers
485
views
What's the Apostrophe or single quote of a variable means in cryptography?
What's the meaning of Apostrophe over a variable in the context conversations of verification?
Reference number: https://people.eecs.berkeley.edu/~jfc/'mender/IEEESP02.pdf
1
vote
1
answer
120
views
Is asymmetric decryption guessable?
I AM an amateur (for some reason, I have originaly written "I am not"... embarassing, sorry) in cryptography so this might be a very basic question.
I am interested to know if there exist ...
-1
votes
1
answer
310
views
How to encrypt using private key for ECC
As we know, ECC using $C_2 = r \cdot G, C_1 = M + r \cdot G$; and decrypt with $M=C_1 - K \cdot C_2$. And sign using point $X$:
$X = k \cdot G(x_0,y_0)$. $r = x_0 \cdot K; s = 1 / k \cdot (M + r \cdot ...
-1
votes
1
answer
127
views
message in mars lander parachute [closed]
I think there's a msg in the parachute of the mars lander , the guy in the vid seems to hint at it
I converted this to binary with red=1 and white=0 starting from the three all-red sectors in the top ...
1
vote
2
answers
979
views
How can RSA be used to compactly sign and encrypt?
How can RSA be used for digital signature with message recovery and encryption, providing transmission of a small message with confidentiality and authentication simultaneously, small cryptogram size, ...
4
votes
7
answers
998
views
Understanding why Semantic Security implies Message Recovery Security
I am stuck in the proof where it says $$p_0=\frac{1}{|M|},$$ I just do not understand how we can infer this equality.
Also, am I right in understanding that B is defined as choosing his two messages ...
0
votes
0
answers
119
views
An insecure signature with message recovery, Dan Boneh
Someone can help me to resolve this questions from the book of Dan Boneh (University of Standford)
2
votes
0
answers
522
views
Elgamal security if same key used twice
Assume that user A sends to user B a message, unencrypted, and signs it with an Elgamal signature.
Can some adversary, call it C, who eavesdrops, learn the private key if user A signed both messages ...
5
votes
2
answers
7k
views
521-bit ECC keys are the same strength as RSA 15,360-bit keys
521 bit ECC uses key sizes 7.5 times smaller than the RSA standard while offering encryption that is magnitudes more secure. An RSA 2048-bit key's secure enough for banking, but a 521-bit ECC key is ...