Transitive signatures: New schemes and proofs

被引:33
作者
Bellare, M [1 ]
Neven, G
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Katholieke Univ Leuven, Dept Elect Engn, B-3001 Heverlee, Belgium
基金
美国国家科学基金会;
关键词
cryptography; digital signatures; Rivest-Shamir-Adleman (RSA) generator; transitive signatures;
D O I
10.1109/TIT.2005.847697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present novel realizations of the transitive signature primitive introduced by Micali and Rivest, enlarging the set of assumptions on which this primitive can be based, an also providing performance improvements over existing schemes More specifically, we propose new schemes based: on factoring the hardness of the one-more discrete logarithm problem, an gap Diffie-Hellman (DH) groups. All these schemes are prove transitively unforgeable under adaptive chosen-message attacin the standard (not random-oracle) model. We also provide a answer to an open question raised by Micali and Rivest regarding the security of their Rivest-Shamir-Adleman (RSA)-based scheme, showing that it is transitively unforgeable under adaptive chosen-message attack assuming the security of RSA under one-more inversion. We then present hash-based modification of, the RSA, factoring, and gap-Diffie-Hellman based scheme that eliminate the need for "node certificates" and thereby yield shorter signatures. These modifications remain provably secure under the same assumptions as the starting scheme, in the random oracle model.
引用
收藏
页码:2133 / 2151
页数:19
相关论文
共 22 条
[11]   HOW TO CONSTRUCT RANDOM FUNCTIONS [J].
GOLDREICH, O ;
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF THE ACM, 1986, 33 (04) :792-807
[12]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[13]  
GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
[14]  
HOHENBERGER S, 2003, THESIS MIT CAMBRIDGE
[15]  
Johnson R., 2002, Topics in Cryptology - CT-RSA 2002. Cryptographers' Track at the RSA Conference 2002. Proceedings (Lecture Notes in Computer Science Vol.2271), P244
[16]  
MICALI S, 2002, LECT NOTES COMPUTER, V2271, P236, DOI DOI 10.1007/3-540-45760-7
[17]  
Okamoto T., 1993, Advances Cryptology-CRYPTO, P31
[18]  
RIVEST R, 2000, 2 SIGNATURE SCHEMES
[19]  
SCHNORR CP, 1990, LECT NOTES COMPUT SC, V435, P239
[20]  
Shahandashti SF, 2005, LECT NOTES COMPUT SC, V3352, P60