Skip to main content

Questions tagged [message-recovery]

Message recovery is a feature of some digital signature schemes, whereas some or all of the message signed is embedded in the signature, recovered as part of signature verification, and thus needs not be transmitted.

0 votes
0 answers
38 views

https://imgur.com/a/ErHmTPz There are more variations than the one present in the image, but the most used letters are certainly present. I tried letter frequency, word searching. The plain text ...
Radu Tudurean's user avatar
2 votes
2 answers
154 views

I have been reviewing the FIPS 204 draft specification for the ML-DSA (Module-Lattice-based Digital Signature Algorithm), which is part of NIST’s Post-Quantum Cryptography (PQC) standardization effort....
Geek's user avatar
  • 21
1 vote
0 answers
106 views

I have been reading Flaws in Applying Proof Methodologies to Signature Schemes and ran into a bit I do not understand. In section 4.2 the authors describe a scheme where a malicious signer crafts a ...
immigrantswede's user avatar
3 votes
1 answer
134 views

In Guillou and Quisquater's 1988 paper "A 'Paradoxical' Indentity-Based Signature Scheme Resulting from Zero-Knowledge", they say that an RSA identity has a shadow and go on to state that ...
Ethan Heilman's user avatar
0 votes
1 answer
189 views

When I read Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited by Dodis et al., it looks as if I have encountered a simple logical bug. (I'm not concerned with the details ...
Duan's user avatar
  • 1
4 votes
2 answers
389 views

Can somebody lead me to existing literature on making the extraction of plaintext dependent on a valid signature check first? I didn't think it was possible to force signatures to be checked; but this ...
Rob's user avatar
  • 349
1 vote
2 answers
485 views

What's the meaning of Apostrophe over a variable in the context conversations of verification? Reference number: https://people.eecs.berkeley.edu/~jfc/'mender/IEEESP02.pdf
Sheldon's user avatar
  • 225
1 vote
1 answer
120 views

I AM an amateur (for some reason, I have originaly written "I am not"... embarassing, sorry) in cryptography so this might be a very basic question. I am interested to know if there exist ...
cnikbesku's user avatar
  • 125
-1 votes
1 answer
310 views

As we know, ECC using $C_2 = r \cdot G, C_1 = M + r \cdot G$; and decrypt with $M=C_1 - K \cdot C_2$. And sign using point $X$: $X = k \cdot G(x_0,y_0)$. $r = x_0 \cdot K; s = 1 / k \cdot (M + r \cdot ...
Edward's user avatar
  • 1
-1 votes
1 answer
127 views

I think there's a msg in the parachute of the mars lander , the guy in the vid seems to hint at it I converted this to binary with red=1 and white=0 starting from the three all-red sectors in the top ...
jeremy_rutman's user avatar
1 vote
2 answers
979 views

How can RSA be used for digital signature with message recovery and encryption, providing transmission of a small message with confidentiality and authentication simultaneously, small cryptogram size, ...
CryptGraphy's user avatar
4 votes
7 answers
998 views

I am stuck in the proof where it says $$p_0=\frac{1}{|M|},$$ I just do not understand how we can infer this equality. Also, am I right in understanding that B is defined as choosing his two messages ...
PhantomR's user avatar
  • 141
0 votes
0 answers
119 views

Someone can help me to resolve this questions from the book of Dan Boneh (University of Standford)
Adam Kd's user avatar
2 votes
0 answers
522 views

Assume that user A sends to user B a message, unencrypted, and signs it with an Elgamal signature. Can some adversary, call it C, who eavesdrops, learn the private key if user A signed both messages ...
beginningcrypto's user avatar
5 votes
2 answers
7k views

521 bit ECC uses key sizes 7.5 times smaller than the RSA standard while offering encryption that is magnitudes more secure. An RSA 2048-bit key's secure enough for banking, but a 521-bit ECC key is ...
djuture's user avatar
  • 51

15 30 50 per page