Certificate-based verifiably encrypted RSA signatures

被引:3
作者
Shao, Zuhua [1 ]
Gao, Yipeng [1 ]
机构
[1] Ohio State Univ, Dept Mat Sci & Engn, Columbus, OH 43210 USA
关键词
fair exchange; verifiably encrypted RSA signature; inside attack; random oracle model; OPTIMISTIC FAIR EXCHANGE; DIGITAL-SIGNATURES; PROTOCOL;
D O I
10.1002/ett.2607
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The RSA signature scheme is one of the most popular signature schemes to date. This paper proposes a certificate-based verifiably encrypted RSA signature scheme that is the first to accomplish optimistic fair exchange of the standard RSA signatures. The main characteristic of this scheme is that the signer can unilaterally choose a certificate authority as his/her adjudicator in fair exchange. Then a certificate, or generally, a signature, acts not only as the binding of the public key and its holder but also as the certificate authority's guarantee against partiality in adjudication. We introduce a strong security model, in which there are three types of inside adversaries with more power than outside adversaries in previous verifiably encrypted RSA signature schemes. We then show that the proposed scheme is existentially unforgeable under the Discrete Logarithm (DL) assumption, the Computational Diffile-Dellman (CDH) assumption, and the RSA assumption in the random oracle model. Because the proposed scheme can be directly used in the current Public-Key Infrastructure (PKI) environment, it is more practical and trustworthy than the previous schemes in the real world. Copyright (c) 2013 John Wiley & Sons, Ltd. This paper proposes a certificate-based verifiably encrypted RSA signature scheme that is the first to accomplish optimistic fair exchange of the standard RSA signatures. The proposed scheme is existentially unforgeable under the discrete logarithm assumption, the computational Diffie-Hellman assumption and the RSA assumption in the random oracle model. The proposed scheme can be directly used in the current PKI environment.
引用
收藏
页码:276 / 289
页数:14
相关论文
共 31 条
[1]  
[Anonymous], P1363 IEEE
[2]  
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]  
Ateniese G, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P138, DOI 10.1145/319709.319728
[4]  
Bellare M., 1993, P 1 ACM C COMPUTER C, P62
[5]   A FAIR PROTOCOL FOR SIGNING CONTRACTS [J].
BENOR, M ;
GOLDREICH, O ;
MICALI, S ;
RIVEST, RL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (01) :40-46
[6]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]  
Boneh D., 2001, P 7 INT C THEOR APPL, P514, DOI [DOI 10.1007/S00145-004-0314-9, 10.1007/s00145-004-0314-9]
[8]  
Boneh D, 2006, LECT NOTES COMPUT SC, V3958, P229
[9]  
Cathalo J, 2004, LECT NOTES COMPUT SC, V3225, P52
[10]  
Dodis Y., 2003, P ACM WORKSH DIG RIG, P47