• Article
  • | |
  • Metrics
  • |
  • Reference [28]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    The formal security model of forward-secure multi-signature is examined and a forward-secure multi-signature scheme with provable security is proposed. Even if the current secret keys of all the signers are exposed, all the signatures pertaining to previous periods are still valid in this scheme. The presented scheme has proven to be secure in the standard model.

    Reference
    [1] Micali S, Ohta K, Reyzin L. Accountable-Subgroup multisignatures. In: Proc. of the 8th ACM Conf. on Computer and Communications Security. 2001. 245?254.
    [2] Ohta K, Okamoto T. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Imai H, Rivest R, Matsumoto T, eds. Proc. of the Asiacrypt 1991. LNCS 739, Berlin: Springer-Verlag, 1991. 139?148.
    [3] Boldyreva A. Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme. In: Desmedt Y, ed. Proc. of the PKC 2003. LNCS 2567, Berlin: Springer-Verlag, 2002. 31?46.
    [4] Komano Y, Ohta K, Shimbo A, Kawamura S. Formal security model of multisignatures. In: Katsikas S, Lopez J, Backes M, Gritzalis S, Preneel B, eds. Proc. of the ISC 2006. LNCS 4176, Berlin: Springer-Verlag, 2006. 146?160.
    [5] Anderson R. Two remarks on public key cryptology. In: Proc. of the Invited Lecture, ACM-CCS’97. 1997. http://www.cl.cam.ac. uk/techreports/UCAM-CL-TR-549.pdf
    [6] Bellare M, Miner S. A forward-secure digital signature scheme. In: Wiener M, ed. Proc. of the CRYPTO’99. LNCS 1666, Berlin: Springer-Verlag, 1999. 431?448.
    [7] Abdalla M, Reyzin L. A new forward-secure digital signature scheme. In: Okamoto T, ed. Proc. of the Asiacrypt 2000. LNCS 1976, Berlin: Springer-Verlag, 2000. 116?129.
    [8] Itkis G, Reyzin L. Forward-Secure signatures with optimal signing and verifying. In: Kilian J, ed. Proc. of the Crypto 2001. LNCS 2139, Berlin: Springer-Verlag, 2001. 499?514.
    [9] Kozlov A, Reyzin L. Forward-Secure signatures with fast key update. In: Cimato S, Galdi C, Persiano G, eds. Proc. of the Security in Communication Networks 2002. LNCS 2576, Berlin: Springer-Verlag, 2002. 247?262.
    [10] Hu F, Wu C, Irwin J. A new forward secure signature scheme using bilinear maps. Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/188.pdf
    [11] Kang B, Park J, Halm S. A new forward secure signature scheme. Cryptology ePrint Archive, 2004. http://eprint.iacr.org/2004/183
    [12] Boyen X, Shacham H, Shen E, Waters B. Forward secure signatures with untrusted update. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. 2006. 191?200.
    [13] Yu J, Kong F, Cheng X, Hao R, Li G. Construction of yet another forward secure signature scheme using bilinear maps. In: Baek J, Bao F, Chen K, Lai X, eds. Proc. of the ProvSec 2008. LNCS 5324, Berlin: Springer-Verlag, 2008. 83?97.
    [14] Dodis Y, Katz J, Xu S, Yung M. Strong key-insulated signature scheme. In: Desmedt Y, ed. Proc. of the PKC 2003. LNCS 2567, Berlin: Springer-Verlag, 2003. 130?144.
    [15] Weng J, Chen KF, Liu SL, Li XX. Identity-Based strong key-insulated signature without random oracles. Journal of Software, 2008, 19(6):1555?1564 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/1555.htm [doi: 10.3724/SP.J.1001.2008. 01555]
    [16] Itkis G, Reyzin L. SiBIR: Signer-Base intrusion-resilient signatures. In: Yung M, ed. Proc. of the Crypto 2002. LNCS 2442, Berlin: Springer-Verlag, 2002. 499?514.
    [17] Libert B, Quisquater J, Yung M. Efficient intrusion-resilient signatures without random oracles. In: Lipmaa H, Yung M, Lin D, eds. Proc. of the Inscrypt 2006. LNCS 4318, Berlin: Springer-Verlag, 2006. 27?41.
    [18] Yu J, Kong F, Cheng X, Hao R, Guo XF. Intrusion-Resilient signature scheme with provable security. Journal of Software, 2010, 21(9):2352?2366 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3772.htm [doi: 10.3724/SP.J.1001.2010. 03772]
    [19] Wang X, Fu F, Zhang Z. A forward secure multisignature scheme. Chinese Journal of Computers, 2004,27(9):1177?1181 (in Chinese with English abstract).
    [20] Sherman S, Lucas C, Yiu S, Chow K. Forward-Secure multisignature and blind signature schemes. Applied Mathematics and Computation, 2005,168(2):895?908. [doi: 10.1016/j.amc.2004.09.015]
    [21] Sunitha N, Amberker B. Forward-Secure multi-signatures. In: Parashar M, Aggarwal S, eds. Proc. of the ICDCIT 2008. LNCS 5375, Berlin: Springer-Verlag, 2008. 89?99.
    [22] Yu J, Hao R, Kong F, Cheng X, Zhao H, Chen Y. Cryptanalysis of a type of forward secure signatures and multi-signatures. Int’l Journal of Computers and Applications, 2010,32(4):1?6.
    [23] Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme. In: Biham E, ed. Proc. of the Eurocrypt 2003. LNCS 2656, Berlin: Springer-Verlag, 2003. 255?271.
    [24] Boneh D, Boyen X, Goh E. Hierarchical identity based encryption with constant size ciphertext. In: Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3493, Berlin: Springer-Verlag, 2005. 440?456.
    [25] Waters B. Efficient identity-based encryption without random oracles. In: Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 114?127.
    附中文参考文献: [15] 翁健,陈克非,刘胜利,李祥学.标准模型下基于身份的强密钥隔离签名.软件学报,2008,19(6):1555?1564. http://www.jos.org.cn/ 1000-9825/19/1555.htm [doi: 10.3724/SP.J.1001.2008.01555]
    [18] 于佳,孔凡玉,程相国,郝蓉,Guo Xiangfa.可证安全的入侵容忍签名方案.软件学报,2010,21(9):2352?2366 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3772.htm [doi: 10.3724/SP.J.1001.2010.03772]
    [19] 王晓明,符方伟,张震.前向安全的多重数字签名方案.计算机学报,2004,27(9):1177?1181.
    Related
    Cited by
Get Citation

于佳,郝蓉,孔凡玉,程相国,GUO Xiang-Fa.标准模型下的前向安全多重签名:安全性模型和构造.软件学报,2010,21(11):2920-2932

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 11,2009
  • Revised:March 11,2010
You are the first2035245Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063