Tight Proofs for Signature Schemes without Random ... - CiteSeerX

0 downloads 121 Views 347KB Size Report
occurs a collision m∗ = mk such that zk = z(rk,mk) = z(rk,m∗) = z∗. For all tcomb-time attackers this happens with

Suggest Documents