{"id":"https://openalex.org/W1489313851","doi":"https://doi.org/10.1007/3-540-48285-7_19","title":"Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme -","display_name":"Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme -","publication_year":2007,"publication_date":"2007-08-01","ids":{"openalex":"https://openalex.org/W1489313851","doi":"https://doi.org/10.1007/3-540-48285-7_19","mag":"1489313851"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-48285-7_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-48285-7_19","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_19.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112710845","display_name":"David Naccache","orcid":"https://orcid.org/0000-0002-8651-6555"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David Naccache","raw_affiliation_strings":["Gemplus Card International, Sarcelles, France","Gemplus Card Internation, Sarcelles, France#TAB#"],"affiliations":[{"raw_affiliation_string":"Gemplus Card International, Sarcelles, France","institution_ids":[]},{"raw_affiliation_string":"Gemplus Card Internation, Sarcelles, France#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5112710845"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.05978753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"233","last_page":"239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6841296553611755},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.6511800289154053},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.49066412448883057},{"id":"https://openalex.org/keywords/a-priori-and-a-posteriori","display_name":"A priori and a posteriori","score":0.4703778624534607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47033390402793884},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46211129426956177},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.44983866810798645},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4379737377166748},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4227569103240967},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3902348279953003},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.37573108077049255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19747033715248108},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.12557801604270935},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.059978365898132324}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6841296553611755},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.6511800289154053},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.49066412448883057},{"id":"https://openalex.org/C75553542","wikidata":"https://www.wikidata.org/wiki/Q178161","display_name":"A priori and a posteriori","level":2,"score":0.4703778624534607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47033390402793884},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46211129426956177},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.44983866810798645},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4379737377166748},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4227569103240967},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3902348279953003},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.37573108077049255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19747033715248108},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.12557801604270935},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.059978365898132324},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/3-540-48285-7_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-48285-7_19","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/3-540-48285-7_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-48285-7_19","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1489313851.pdf","grobid_xml":"https://content.openalex.org/works/W1489313851.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1589034595","https://openalex.org/W1592578919","https://openalex.org/W1983378843","https://openalex.org/W1996360405","https://openalex.org/W2047360699","https://openalex.org/W2069278736","https://openalex.org/W4231440355","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2290466083","https://openalex.org/W2362904663","https://openalex.org/W2368634462","https://openalex.org/W2390942931","https://openalex.org/W2125461068","https://openalex.org/W2149234266","https://openalex.org/W4310384357","https://openalex.org/W2357744715","https://openalex.org/W67731976","https://openalex.org/W1981680180"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"a":[3,37,63],"family":[4],"of":[5,66,98,111,128],"new":[6,160],"Ong-Schnorr-Shamir-Fiat-Shamir-like":[7],"[]":[8],"identification":[9,29],"and":[10,68,81,130,132,147],"signature":[11,24,94],"protocols":[12],"designed":[13],"to":[14,86,153],"prevent":[15],"forgers":[16],"from":[17],"using":[18],"the":[19,46,70,99,125,138,159],"Pollard-Schnorr":[20],"attack":[21],"[].Our":[22],"first":[23],"scheme":[25],"(and":[26],"its":[27],"associated":[28],"protocol)":[30],"uses":[31],"x,":[32],"which":[33,40,90],"is":[34,50,62,91],"secret-free,":[35],"as":[36,74],"commitment":[38],"on":[39,145],"k":[41,77,114],"will":[42],"depend":[43],"later.":[44],"Therefore,":[45],"original":[47],"quadratic":[48],"equation":[49],"replaced":[51],"by":[52,141],"x2":[53,112],"\u2212":[54],"-k(x)y2":[55],"=":[56,116],"m":[57,117],"mod":[58,118],"n":[59],"where":[60],"k(x)":[61,89],"non-polynomial":[64],"function":[65],"x":[67,80,129,146],"since":[69],"Poliard-Schnorr":[71],"algorithm":[72],"takes":[73,96],"input":[75],"value":[76],"(to":[78],"output":[79],"y),":[82],"it":[83,149],"becomes":[84,150],"impossible":[85],"feed":[87],"\u00e0-priori":[88],"output-dependentThe":[92],"second":[93],"method":[95],"advantage":[97],"fact":[100],"that":[101,157],"although":[102],"an":[103],"attacker":[104],"can":[105],"generate":[106],"validOSS":[107],"signatures":[108],"(solutions":[109],"{x,y}":[110],"-":[113],"y2":[115],"n),":[119],"he":[120],"has":[121],"no":[122],"control":[123],"over":[124],"internal":[126],"structure":[127],"y":[131],"in":[133],"particular,":[134],"if":[135],"we":[136],"restrict":[137],"solution":[139],"space":[140],"adding":[142],"extra":[143],"conditions":[144],"y,":[148],"very":[151],"difficult":[152],"produce":[154],"forged":[155],"solutions":[156],"satisfy":[158],"requirements.":[161]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
