Reactively secure signature schemes

被引:0
|
作者
Backes M. [1 ]
Pfitzmann B. [1 ]
Waidner M. [1 ]
机构
[1] IBM Research, Zurich Research Laboratory
关键词
Cryptography; Digital signatures; Reactive; Security;
D O I
10.1007/s10207-004-0062-8
中图分类号
学科分类号
摘要
Protocols for problems like Byzantine agreement, clock synchronization, or contract signing often use digital signatures as the only cryptographic operation. Proofs of such protocols are frequently based on an idealizing "black-box" model of signatures. We show that the standard cryptographic security definition for digital signatures is not sufficient to ensure that such proofs are still valid if the idealized signatures are implemented with real, provably secure signatures. We propose a definition of signature security suitable for general reactive, asynchronous environments, called reactively secure signature schemes, and prove that, for signature schemes where signing just depends on a counter as state, the standard security definition implies our definition. We further propose an idealization of digital signatures that can be used in a reactive and composable fashion, and we show that reactively secure signature schemes constitute a secure implementation of our idealization. © Springer-Verlag 2005.
引用
收藏
页码:242 / 252
页数:10
相关论文
共 50 条
  • [31] A secure Certificateless Aggregate Signature Scheme
    Kang, Baoyuan
    Xu, Danhui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 55 - 67
  • [32] A new provably secure signature scheme
    Tan, CH
    Yi, X
    Siew, CK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2633 - 2635
  • [33] Improvement of some proxy signature schemes
    Li, JG
    Liang, ZH
    Zhu, YL
    Zhang, YC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 407 - 411
  • [34] Cryptanalysis of two group signature schemes
    Joye, M
    Kim, S
    Lee, NY
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 271 - 275
  • [35] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [36] THE SECURITY OF HE AND KIESLERS SIGNATURE SCHEMES
    LEE, NY
    HWANG, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 370 - 372
  • [37] Lattice Attacks on Digital Signature Schemes
    N. A. Howgrave-Graham
    N. P. Smart
    Designs, Codes and Cryptography, 2001, 23 : 283 - 290
  • [38] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [39] Requirements for Secure Graphical Password Schemes
    Rasekgala, Mokgadi
    Ewert, Sigrid
    Sanders, Ian
    Fogwill, Thomas
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [40] Certificateless Aggregate Signature Schemes: A Review
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 531 - 536