• Article
  • | |
  • Metrics
  • |
  • Reference [10]
  • |
  • Related [20]
  • |
  • Cited by [3]
  • | |
  • Comments
    Abstract:

    The problem called “constructing signature schemes for specified verifiers” is proposed by Laih, and such a scheme is also given by Laih. It is shown that this scheme is not secure and a scheme called SV-EDL is put forward. Furthermore, the provable security theory is used to analyze such schemes, i.e. the security of SV-EDL scheme is proved in RO (random oracle) model. The security against forgery is tightly related to the Computational Diffie-Hellman problem, i.e. the forgery is almost as difficult as solving CDH (computational Diffie-Hellman) problem. Especially, for anyone except the specified verifiers, the ability of verifying signature is tightly related to DDH (decisional Diffie-Hellman) problem. Since the hardness of the CDH and DDH problem is widely believed to be closely related to the hardness of the DL (discrete logarithm) problem, the scheme offers better security guarantees than the existing schemes. In addition, it offers non-repudiation in a very straight-forward manner. Finally, the concept of threshold verification is proposed and a (t,m)-threshold verification protocol is constructed, and its security is proved in the standard model. Especially, the scheme does not ask for the existence of the trusted center.

    Reference
    [1]Laih C,Yen SM.Multisignature for specifical group of verifier.Journal of Information Science and Engineering,1996,12(1):143-152.
    [2]He WH.Weakness in some multisignature schemes for specified group of verifiers.Information Procesing Letters,2002,83(2):95-99.
    [3]Goh EJ,Jarecki S.A signature scheme as secure as the Diffie-Hellman problem.In:Biham E,ed.Advances in CryptologyEUROCRYPT 2003.LNCS 2656,Berlin:Springer-Verlag Publishers,2003.401-415.
    [4]Bellare M,Rogaway P.Random oracles are practical:A paradigm for designing efficient protocols.In:Proc.of the 1 st ACM Conf.on Computer and Communicatuions Security.New York:ACM Press,1993.62-73.
    [5]Micali S,Ohta K,Reyzin L.Accountable-Subgroup multisignatures.In:Sander T,ed.Proc.of the 8th ACM Conf.on Computer and Communications Security.New York:ACM Press,2001.245-254.
    [6]Raimondo MD,Gennaro R.Provably secure threshold password-Authenticared key exchange.In:Bihnm E,ed.Advances in Cryptology--EUROCRYPT 2003.LNCS 2656,Berlin:Springer-Verlag,2003.507-523.
    [7]Wu QH,Wang JL,Wang YM.t-out-of-n ring signatures from discrete logarithm public keys.In:Chen KF,Li X,eds.Advances in Cryptology-Chinacrypt 2004.Beijing:Science Press,2004.209-214 (in Chinese with English abstract).
    [8]Canetti R,Gennaro R,Jarecki S,Krawczyk H,Rabin T.Adaptive security for threshold cryptosystems.In:Wiener M,ed.Advances in Cryptology-CRYPT'99.LNCS 1666,Berlin:Springer-Verlag,1999.98-115.
    [9]Goldreich O.Foundations of Cryptography:Basic Tools.Beijing:Publishing House of Electronics Industry,2003.35-107.
    [7]伍前红,王继林,王育民.基于离散对数公钥的t-out-of-n环签字.见:陈克非,李祥,编.密码学进展--ChinaCrypt 2004.北京:科学出版社,2004.209-214.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

陈伟东,冯登国,谭作文.指定验证方的门限验证签名方案及安全性证明.软件学报,2005,16(11):1967-1974

Copy
Share
Article Metrics
  • Abstract:5118
  • PDF: 5327
  • HTML: 0
  • Cited by: 0
History
  • Received:March 23,2004
  • Revised:June 02,2005
You are the first2038588Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063