A Secure Signature Scheme from Bilinear Maps

作者: Dan Boneh , Ilya Mironov , Victor Shoup

DOI: 10.1007/3-540-36563-X_7

关键词:

摘要: Traditionally, the strongest notion of security for undeniable and confirmer signatures is invisibility under adaptive attacks. This property was promoted by Camenisch Michels they provided schemes with this property. Gennaro, Krawczyk Rabin (GKR) developed an RSA-based scheme which much more efficient than Michels, but it does not have invisibility. We give as GKR scheme, has invisibility. We suggest that anonymity most relevant signatures. a precise definition in multi-user setting show are closely related. Finally, we can be achieved even when parties use completely different cryptographic primitives.

参考文章(39)
Ronald L. Rivest, Silvio Micali, Shafi Goldwasser, A "Paradoxical" Solution to the Signature Problem (Extended Abstract) foundations of computer science. pp. 441- 448 ,(1984)
Yvo Desmedt, Securing traceability of ciphertexts: towards a secure software key escrow system theory and application of cryptographic techniques. pp. 147- 157 ,(1995) , 10.1007/3-540-49264-X_12
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)
Markus Jakobsson, Kazue Sako, Russell Impagliazzo, Designated verifier proofs and their applications theory and application of cryptographic techniques. pp. 143- 154 ,(1996) , 10.1007/3-540-68339-9_13
Oded Goldreich, Two remarks concerning the Goldwasser-Micali-Rivest signature scheme international cryptology conference. pp. 104- 110 ,(1987) , 10.1007/3-540-47721-7_8
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Ronald Cramer, Ivan Damgård, Escure Signature Schemes based on Interactive Protocols international cryptology conference. pp. 297- 310 ,(1995) , 10.1007/3-540-44750-4_24
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
Markus Michels, Markus Stadler, Generic constructions for secure and efficient confirmer signature schemes theory and application of cryptographic techniques. pp. 406- 421 ,(1998) , 10.1007/BFB0054142
Rosario Gennaro, Hugo Krawczyk, Tal Rabin, RSA-Based Undeniable Signatures international cryptology conference. pp. 132- 149 ,(1997) , 10.1007/BFB0052232