A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack.dvi

نویسندگان

  • Huafei Zhu
  • Bao Feng
  • Robert H. Deng
چکیده

All node certificate based transitive signature schemes available in the literature make use of any digital signature scheme which is assumed to be provably secure against adaptive chosen-message attack, as a building block to produce node certificates in a graph. Consequently the algebraic structures to represent nodes in the graph are independent of the algebraic structure of signature scheme employed. This inconsistence of representation structures of the signature scheme, nodes and edges in the graph could increase the cost to manage those public data. For example, the transitive signature schemes presented by Micali and Rivest [5] and Bellare and Neven (the node certificate based version FBTS-1, in [1]), both heavily rely on the standard provably secure signature scheme (say Goldwasser-Micali-Rivest’s signature scheme [7]). Consequently, a core problem related to transitive signature schemes is how to construct transitive signature schemes so that the representation structures of signature schemes, nodes and edges in a graph can be implemented compactly? Bellare and Neven’s hash-based modification, FBTS-2, achieving shorter signatures by eliminating the need for node certificates and provable under the same factoring assumption in the random oracle model, is actually the first solution to the above question. Our approach to attack the problem mentioned above, is different from Bellare and Neven’s. We attack the problem by first carefully defining algebraic structure to represent vertices and edges in an undirected graph, then we construct a signature scheme so that its algebraic structure is coincident with that of vertices and edges in the graph. Finally, we present a practical realization of a transitive signature scheme that is proven transitively unforgeable under adaptive chosen message attack in the standard intractability paradigm. To the best knowledge of authors, this approach has NOT been reported in the literature.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack

All node certificate based transitive signature schemes available in the literature make use of any digital signature scheme which is assumed to be provably secure against adaptive chosen-message attack, as a building block to produce node certificates in a graph. Consequently the algebraic structures to represent nodes in the graph are independent of the algebraic structure of signature scheme...

متن کامل

A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs

We present a realization of the transitive signature scheme based on the algebraic properties of bilinear group pairs. The scheme is proven secure, i.e. transitively unforgeable under adaptive chosen message attack, assuming hardness of the computational co-Diffie-Hellman problem in bilinear group pairs and the security of the underlying standard signature scheme under known message attack. Our...

متن کامل

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs

A signcryption scheme combining public key encryption and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recov...

متن کامل

A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack

We study elliptic curve cryptosystems by first investigating the schemes defined over Zp and show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional DiffieHellman assumption. Then we derive a practical elliptic curve cryptosystem by making use of some nice elliptic curve where the decisional DiffieHellman assumption is reserved.

متن کامل

Transitive Signatures Based on Non-adaptive Standard Signatures

Transitive signature, motivated by signing vertices and edges of a dynamically growing, transitively closed graph, was first proposed by Micali and Rivest. The general designing paradigm proposed there involved a underlying standard signature scheme, which is required to be existentially unforgeable against adaptive chosen message attacks. We show that the requirement for the underlying signatu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003