ar X iv : 0 80 2 . 11 13 v 1 [ cs . C R ] 8 F eb 2 00 8 Multi - Use Unidirectional Proxy Re - Signatures
نویسنده
چکیده
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice’s secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party’s signing key and cannot sign arbitrary messages on behalf of Alice or Bob. At CCS 2005, Ateniese and Hohenberger revisited the primitive by providing appropriate security definitions and efficient constructions in the random oracle model. Nonetheless, they left open the problem of designing a multi-use unidirectional scheme where the proxy is able to translate in only one direction and signatures can be re-translated several times. This paper solves this problem, suggested for the first time 10 years ago, and shows the first multi-hop unidirectional proxy re-signature schemes. We describe a random-oracle-using system that is secure in the Ateniese-Hohenberger model. The same technique also yields a similar construction in the standard model (i.e. without relying on random oracles). Both schemes are efficient and require newly defined – but falsifiable – Diffie-Hellman-like assumptions in bilinear groups.
منابع مشابه
ar X iv : 0 80 2 . 11 21 v 1 [ m at h . PR ] 8 F eb 2 00 8 Representation of the penalty term of dynamic concave utilities
In this paper we will provide a representation of the penalty term of general dynamic concave utilities (hence of dynamic convex risk measures) by applying the theory of g-expectations.
متن کاملAutomating Image Analysis by Annotating Landmarks with Deep Neural Networks
3 Introduction 3 Materials and Methods 5 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Deep Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Deep Neural Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Experimental Setup . . . . ...
متن کاملar X iv : 0 80 2 . 08 32 v 1 [ cs . C R ] 6 F eb 2 00 8 Distributed Double Spending Prevention
We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several ...
متن کاملar X iv : 0 80 2 . 10 79 v 1 [ m at h . C A ] 8 F eb 2 00 8 p - ADIC MULTIRESOLUTION ANALYSIS AND WAVELET FRAMES
We study p-adic multiresolution analyses (MRAs). A complete characterisation of test functions generating MRAs (scaling functions) is given. We prove that only 1-periodic test functions may be taken as orthogonal scaling functions. We also suggest a method for the construction of wavelet functions and prove that any wavelet function generates a p-adic wavelet frame.
متن کاملar X iv : 0 80 2 . 04 53 v 1 [ m at h - ph ] 4 F eb 2 00 8 1 Essential Spectrum of Multiparticle Brown – Ravenhall Operators in External Field
The essential spectrum of multiparticle Brown– Ravenhall operators is characterized in terms of two–cluster decompositions for a wide class of external fields and interparticle interactions and for the systems with prescribed symmetries. 2000 Mathematics Subject Classification: 81V55, 81Q10
متن کامل