期刊文献+

普适安全的基于身份的签名机制 被引量:7

Universally Composable Identity-Based Signature
下载PDF
导出
摘要 理想功能是UC安全协议的基本单元和核心内容.在UC安全框架下协议设计的首要步骤就是要将协议所希望完成的功能抽象为一个"理想功能","理想功能"的合理定义不仅要从定义上保证安全,更重要的是要兼顾其可实现性.本文定义了基于身份的签名机制(IBS)在UC安全框架下对应的理想功能FIBS,证明了其可实现性以及UC安全的IBS与经典IBS安全定义EUF-CMIA安全之间的等价关系,保证了在构造复杂环境下UC安全协议的时候,EUF-CMIA安全的IBS可以作为一个模块被安全调用. Idea Functionality is the core and basic unit of Universally Composable(UC) security protocols.The first step of designing the protocols,within the UCsecurity framework,is to extract an ideal functionality from the expected functionalities of the protocols.To appropriately define an ideal functionality we should not only protect the security of the definition,but also consider the realizability.This study investigates the security of identity-based signature(IBS) within the UCframework,defines a realizable identity-based signature functionality FIBS,proves that UC-secure IBS is equivalent to conventionally-secure(EUF-CMIA-secure) IBS.As a result,we are able to make sure that the EUFCMIA scheme can be a module in designing a complex protocol that satisfies the UCrequirement.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第7期1613-1617,共5页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2006AA01Z420)
关键词 普适安全 理想功能 基于身份的签名机制 抗选择性消息和身份攻击 universally composable(UC) security ideal functionality identity-based signature(IBS) existential unforgery for adaptive chose-message and identity attack(EUF-CMIA)
  • 相关文献

参考文献6

二级参考文献45

  • 1李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 4Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35~52
  • 5Schneier B.. Applied Cryptography(2nd Edition). New York: John Wileysons, 1996
  • 6Rubin A.D.. Nonmonotonic cryptographic protocols[Ph.D. dissertation]. University of Michigan, Ann Arbor, 1994
  • 7Halpern J.Y., Fagin R.. Modelling knowledge and action in distributed systems. Distributed Computing,1989,3(4):159~179
  • 8Woo T.Y.C., Lam S.S.. A semantic model for authentication protocols. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 178~194
  • 9Marrero W., Clarke E., Jha S.. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487
  • 10Stoller S.D.. A bound on attacks on payment protocols. In: Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science(LICS), Boston, Massachusetts, 2001, 61~70

共引文献141

同被引文献75

引证文献7

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部