Oblivious signature-based envelope

被引:26
|
作者
Li, NH
Du, WL
Boneh, D
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[3] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[4] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
关键词
D O I
10.1007/s00446-004-0116-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new cryptographic primitive called oblivious signature-based envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a receiver, and has the following two properties: (1) The receiver can open the envelope if and only if it has a third party's (e.g., a certi. cation authority's) signature on an agreed-upon message. (2) The sender does not learn whether the receiver has the signature or not. We show that OSBE can be used to break policy cycles in automated trust negotiation (ATN) and to achieve oblivious access control. We develop a provably secure and efficient OSBE protocol for certificates signed using RSA signatures, as well as provably secure and efficient one-round OSBE protocols for Rabin and BLS signatures from recent constructions for identity-based encryption. We also present constructions for Generalized OSBE, where signatures on multiple messages (and possibly by different authorities) are required to open the envelope.
引用
收藏
页码:293 / 302
页数:10
相关论文
共 50 条
  • [1] Oblivious signature-based envelope
    Ninghui Li
    Wenliang Du
    Dan Boneh
    Distributed Computing, 2005, 17 : 293 - 302
  • [2] Oblivious signature-based envelope without secure channel
    School of Computer Science, Zhejiang University, Hangzhou 310027, China
    不详
    不详
    Zhejiang Daxue Xuebao (Gongxue Ban), 2006, 4 (590-593):
  • [3] Revisiting Oblivious Signature-Based Envelopes
    Nasserian, Samad
    Tsudik, Gene
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2006, 4107 : 221 - 235
  • [4] Signature-based landscape design
    Woodward, JH
    ECOLOGICAL DESIGN AND PLANNING, 1997, : 201 - 225
  • [5] Signature-based image identification
    Abdel-Mottaleb, M
    Vaithilingam, G
    Krishnamachari, S
    MULTIMEDIA SYSTEMS AND APPLICATIONS II, 1999, 3845 : 22 - 28
  • [6] Signature-based document retrieval
    Chalechale, A
    Naghdy, G
    Mertins, T
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, 2003, : 597 - 600
  • [7] Signature-Based Trajectory Similarity Join
    Ta, Na
    Li, Guoliang
    Xie, Yongqing
    Li, Changqi
    Hao, Shuang
    Feng, Jianhua
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2017, 29 (04) : 870 - 883
  • [8] On signature-based expressions of system reliability
    Marichal, Jean-Luc
    Mathonet, Pierre
    Waldhauser, Tamas
    JOURNAL OF MULTIVARIATE ANALYSIS, 2011, 102 (10) : 1410 - 1416
  • [9] Signature-based methods for data streams
    Cortes, C
    Pregibon, D
    DATA MINING AND KNOWLEDGE DISCOVERY, 2001, 5 (03) : 167 - 182
  • [10] A new approach to signature-based authentication
    Gluhchev, Georgi
    Savov, Mladen
    Boumbarov, Ognian
    Vasileva, Diana
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 594 - +