Reactively secure signature schemes

被引:0
|
作者
Backes M. [1 ]
Pfitzmann B. [1 ]
Waidner M. [1 ]
机构
[1] IBM Research, Zurich Research Laboratory
关键词
Cryptography; Digital signatures; Reactive; Security;
D O I
10.1007/s10207-004-0062-8
中图分类号
学科分类号
摘要
Protocols for problems like Byzantine agreement, clock synchronization, or contract signing often use digital signatures as the only cryptographic operation. Proofs of such protocols are frequently based on an idealizing "black-box" model of signatures. We show that the standard cryptographic security definition for digital signatures is not sufficient to ensure that such proofs are still valid if the idealized signatures are implemented with real, provably secure signatures. We propose a definition of signature security suitable for general reactive, asynchronous environments, called reactively secure signature schemes, and prove that, for signature schemes where signing just depends on a counter as state, the standard security definition implies our definition. We further propose an idealization of digital signatures that can be used in a reactive and composable fashion, and we show that reactively secure signature schemes constitute a secure implementation of our idealization. © Springer-Verlag 2005.
引用
收藏
页码:242 / 252
页数:10
相关论文
共 50 条
  • [21] Attribute-based signature schemes with accountability
    Ren, Yan
    Tang, Chunming
    Wang, Guilin
    Wong, DuncaN. S.
    International Journal of Information and Communication Technology, 2015, 7 (2-3) : 141 - 158
  • [22] New Multiparty Signature Schemes for Network Routing Applications
    Boldyreva, Alexandra
    Gentry, Craig
    O'Neill, Adam
    Yum, Dae Hyun
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [23] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [24] Cryptanalysis of Blind Signature Schemes
    Singh, Nitu
    Das, Sumanjit
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 73 - 77
  • [25] Attacks on Secure Logging Schemes
    Hartung, Gunnar
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 268 - 284
  • [26] Efficient one-time signature schemes for stream authentication
    Park, Yongsu
    Cho, Yookun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (03) : 611 - 624
  • [27] Design Principles for HFEv- Based Multivariate Signature Schemes
    Petzoldt, Albrecht
    Chen, Ming-Shing
    Yang, Bo-Yin
    Tao, Chengdong
    Ding, Jintai
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 311 - 334
  • [28] On the Suitability of Post-Quantum Signature Schemes for Internet of Things
    Shim, Kyung-Ah
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10648 - 10665
  • [29] Security analysis and improvement of some threshold proxy signature schemes
    Xue, QS
    Cao, ZF
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 947 - 952
  • [30] A Survey on Secure Group Communication Schemes With Focus on IoT Communication
    Prantl, Thomas
    Zeck, Timo
    Bauer, Andre
    Ten, Peter
    Prantl, Dominik
    Ben Yahya, Ala Eddine
    Ifflaender, Lukas
    Dmitrienko, Alexandra
    Krupitzer, Christian
    Kounev, Samuel
    IEEE ACCESS, 2022, 10 : 99944 - 99962