Digital signature with information theoretical security

Click For Summary
SUMMARY

The discussion centers on the existence of classical digital signature schemes that provide information-theoretical security, contrasting them with those that only secure against computationally bounded attacks. Participants reference a specific book, "Information-Theoretic Security," which contains extensive information on this topic. The conversation highlights the challenge of accessing such resources in local libraries.

PREREQUISITES
  • Understanding of digital signature schemes
  • Familiarity with information-theoretic security concepts
  • Knowledge of computationally bounded attacks
  • Ability to access and interpret academic resources
NEXT STEPS
  • Research classical digital signature schemes with information-theoretical security
  • Explore the book "Information-Theoretic Security" for in-depth knowledge
  • Investigate the implications of computationally bounded attacks on security
  • Find alternative libraries or online resources for academic texts
USEFUL FOR

Cryptographers, security researchers, and anyone interested in the theoretical foundations of digital signatures and their security implications.

Dragonfall
Messages
1,023
Reaction score
5
Is there such a classical scheme? I only know of those which offer security from computationally bounded attacks.
 
Computer science news on Phys.org
Ah... very interesting. Thanks. Can't find it in any library here though.
 

Similar threads

Replies
5
Views
2K
Replies
5
Views
918
  • · Replies 12 ·
Replies
12
Views
2K
  • · Replies 31 ·
2
Replies
31
Views
5K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 24 ·
Replies
24
Views
5K
Replies
5
Views
1K
  • · Replies 11 ·
Replies
11
Views
2K
  • · Replies 29 ·
Replies
29
Views
5K
  • · Replies 27 ·
Replies
27
Views
5K