Reactively secure signature schemes

被引:0
|
作者
Backes M. [1 ]
Pfitzmann B. [1 ]
Waidner M. [1 ]
机构
[1] IBM Research, Zurich Research Laboratory
关键词
Cryptography; Digital signatures; Reactive; Security;
D O I
10.1007/s10207-004-0062-8
中图分类号
学科分类号
摘要
Protocols for problems like Byzantine agreement, clock synchronization, or contract signing often use digital signatures as the only cryptographic operation. Proofs of such protocols are frequently based on an idealizing "black-box" model of signatures. We show that the standard cryptographic security definition for digital signatures is not sufficient to ensure that such proofs are still valid if the idealized signatures are implemented with real, provably secure signatures. We propose a definition of signature security suitable for general reactive, asynchronous environments, called reactively secure signature schemes, and prove that, for signature schemes where signing just depends on a counter as state, the standard security definition implies our definition. We further propose an idealization of digital signatures that can be used in a reactive and composable fashion, and we show that reactively secure signature schemes constitute a secure implementation of our idealization. © Springer-Verlag 2005.
引用
收藏
页码:242 / 252
页数:10
相关论文
共 50 条
  • [1] Group signature schemes with forward secure properties
    Chen, L
    Huang, XQ
    You, JY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 841 - 849
  • [2] Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments
    Shim, Kyung-Ah
    IEEE ACCESS, 2022, 10 : 124848 - 124857
  • [3] Unconditionally secure signature schemes revisited
    Swanson, Colleen M.
    Stinson, Douglas R.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2016, 10 (01) : 35 - 67
  • [4] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [5] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [6] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Alexandra Boldyreva
    Adriana Palacio
    Bogdan Warinschi
    Journal of Cryptology, 2012, 25 : 57 - 115
  • [7] Forward-secure multisignature and blind signature schemes
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 895 - 908
  • [8] Key substitution attacks on provably secure short signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (02) : 611 - 612
  • [9] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things
    Qiao, Zirui
    Zhou, Yanwei
    Yang, Bo
    Zhang, Mingwu
    Wang, Tao
    Xia, Zhe
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730
  • [10] Key substitution attacks on some provably secure signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 226 - 227