期刊文献+

基于身份数字签名方案的通用可组合安全性 被引量:2

Universally composable security of identity-based signature schemes
下载PDF
导出
摘要 在通用可组合安全性框架下定义了基于身份的数字签名方案的通用可组合安全性。证明了基于身份数字签名方案的通用可组合安全性与传统的安全性——在选择消息和选择身份攻击下的不可存在性伪造——之间的等价性。这一结果表明基于身份的数字签名方案可以作为安全的密码原语用于构建更复杂的密码协议。 A definition of universally composable security of identity-based signature schemes was proposed in the universally eomposable security framework. The equivalence of the universally composable security and the traditional security of identity-based signature schemes was proved. This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.
作者 王泽成
出处 《计算机应用》 CSCD 北大核心 2011年第1期118-122,126,共6页 journal of Computer Applications
基金 安徽省高等学校自然科学基金资助项目(KJ2009B128Z)
关键词 基于身份的数字签名 理想功能 通用可组合安全性 identity-based signature ideal functionality universally composable security
  • 相关文献

参考文献17

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C]// CRYPTO'84: Proceedings of the Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 1984:47-53.
  • 2CHA J C. CHEON J H. An identity-based signature from gap Diffie- Hellman groups[C]// PKC 2003: Proceedings of Public Key Cryptography. Berlin, Heidelberg: Springer-Verlag, 2003:18-30.
  • 3GOLDWASSER S, MICALI S, RIVEST R L. A digital signature scheme secure against adaptive chosen-message attacks[ J]. SIAM Journal on Computing, 1988, 17(2): 281-308.
  • 4BELLARE M, NAMPREMPRE C, NEVEN G. Security proofs for identity-based identification and signature schemes[ C]// Eurocrypt 2004: Proceedings of the Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 2004:268-286.
  • 5PATERSON K G, SCHULDT J C N. Efficient identity-based signatures secure in the standard model [ C ]// Proceedings of ACISP 2006. Berlin, Heidelberg: Springer-Verlag, 2006:207-222.
  • 6CANETTI R. Universally composable security: A new paradigm for eryptographic protocols[C]// Proceedings of the 42nd IEEE Annual Symposium on Foundations of Computer Science. Washington, DC: IEEE Computer Society, 2001 : 136 - 145.
  • 7CANETTI R, DODIS Y, PASS R, et al. Universally composable security with global setup[ C]// Proceedings of the Theory of Cryptography Conference. Berlin, Heidelberg: Springer-Verlag, 2007:61 - 85.
  • 8CANETTI R, KUSHILEVITZ E, LINDELL Y. On the limitations of universally composable two-party computation without set-up assumptions[ J]. Journal of Cryptology, 2006, 19(2) : 135 - 167.
  • 9DATI'A A, DEREK A, MITCHELL J C et al. Games and the impossibility of realizable ideal functionality [ C]// Proceedings of the Theory of Cryptography Conference. Berlin, Heidelberg: Springer- Verlag, 2006:360-379.
  • 10HORVITZ O, KATZ J. Universally composable two-party computation in two rounds [ C]// CRYPTO 2007: Proceedings of the Advances in Cryptology. Berlin, Heidelberg: Springer-Verlag, 2007: 111 - 129.

同被引文献31

  • 1柴震川,董晓蕾,曹珍富.利用二次剩余构造的基于身份的数字签名方案[J].中国科学(F辑:信息科学),2009,39(2):199-204. 被引量:9
  • 2卢鹏菲,詹雄泉,洪景新.基于椭圆曲线的有序多重数字签名方案[J].厦门大学学报(自然科学版),2005,44(3):341-343. 被引量:9
  • 3罗丽平,施荣华,刘宇.基于RSA的ElGamal型有序多重数字签名方案[J].计算机工程与应用,2006,42(1):120-121. 被引量:4
  • 4胡越梅,朱艳琴.一个基于ECC的多重数字签名方案[J].微电子学与计算机,2007,24(1):180-182. 被引量:3
  • 5Anderson R. Two remarks on public-key cryptology [ C ]//Invited lec- ture : Proceedings of Fourth Annual Conference on Computer and Com- munication Security, New York : ACM Press, 1997.
  • 6Bellare M, Miner S. A forward-secure digital signature scheme [ C ]// 19th Annual International Cryptology Conference Santa Barbara, Cali- fornia, USA, August 15 - 19,1999.LNCS, Berlin : Springer, 1999.
  • 7Abdalla M, Reyzin L. A new forward-secure digital signature scheme [ C]//6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3 - 7, 2000, LNCS ,2000,1976 : 126 - 129.
  • 8Krawczyk H. Simple forward-secure signatures for any signature scheme [ C]//Proceedings of the 7th ACM Conferenee on Computer and Com- munications Security,2000 : 108 - 125.
  • 9Kang B G, Park J H, Hahn S G. A new forward secure signature scheme [ R]. Cryptology ePrint Archive ,2004.
  • 10Yu J,Kong F Y,Cheng X G,et al. Construction of yet another forward secure signature scheme using bilinear maps [ C ]//the second interna- tional conference on provable security, LNCS 5324, Springer-Verlag, Berlin,2008 : 83 - 97.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部