Concurrent signature without random oracles

被引:2
作者
Tan, Xiao [1 ,3 ]
Huang, Qiong [2 ]
Wong, Duncan S. [3 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou, Zhejiang, Peoples R China
[2] South China Agr Univ, Coll Informat, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Concurrent signature; Fair exchange; Ambiguity; Anonymity; Accountability; Provable security; Multi-user setting; OPTIMISTIC FAIR EXCHANGE; UNDENIABLE SIGNATURES; CONSTRUCTION; COLLISIONS; MD5;
D O I
10.1016/j.tcs.2014.09.044
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A concurrent signature provides an efficient way to exchange digital signatures between parties in a fair manner. Since its introduction in Eurocrypt 2004, removing the random oracle heuristic in the security analysis of a concurrent signature scheme has become an open problem, and the security of all the existing provably secure schemes could have only been done in the random oracle model, while it has been known that the security in the random oracle model may not be guaranteed when the underlying random oracles are replaced by real-life hash functions. In this paper, we solve this open problem by proposing a new concurrent signature scheme, which allows us to prove its security without random oracles. The security model we consider in this paper also slightly differs from previous works. Signatures before revealing the keystone are strongly ambiguous (or anonymous) in the sense that everyone is able to produce signatures that are indistinguishable from those generated honestly by the parties involved in the exchange, while signatures after revealing the keystone remain unforgeable without sacrificing the fairness property. In the multi-user setting and without random oracles, we prove the security of our scheme based on the intractability of Computational Diffie-Hellman (CDH) problem and collision resistance of hash functions. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:194 / 212
页数:19
相关论文
共 40 条
[1]  
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
[Anonymous], 1991, J CRYPTOL
[4]  
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[5]  
Bellare M., 1993, P ANN INT CRYPT C, V740, P390, DOI 10.1007/3-540-48071-4
[6]  
Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
[7]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[8]   Certificateless Threshold Ring Signature [J].
Chang, Shuang ;
Wong, Duncan S. ;
Mu, Yi ;
Zhang, Zhenfeng .
INFORMATION SCIENCES, 2009, 179 (20) :3685-3696
[9]  
Chen LQ, 2004, LECT NOTES COMPUT SC, V3027, P287
[10]  
Chow SSM, 2005, LECT NOTES COMPUT SC, V3783, P194