[...] in order to prevent from a birthday paradox attack on the signature.
A birthday attack is applicable to hash functions, not encryption or signatures.
Further, with the birthday paradox you would calculate the probability of creating 2 messages which result in the same hash (any random hash!).
Not a second message with the same (given) hash which the signed one has.
This is not applicable in this case. Neither theoretical nor practical.