Selectively unforgeable but existentially forgeable signature schemes and applications

被引:0
|
作者
TIAN HaiBo [1 ]
ZHANG FangGuo [1 ]
CHEN XiaoFeng [2 ]
WEI BaoDian [1 ]
机构
[1] School of Information Science and Technology,Sun Yat-Sun University
[2] State Key Laboratory of Integrated Service Networks,Xidian University
基金
中国国家自然科学基金; 国家教育部博士点专项基金资助;
关键词
signature schemes; selectively unforgeable; deniable authentication;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This paper gives definitions,constructions and applications of signature schemes,which are selectively unforgeable but existentially forgeable(SUEF).We formalize the special notion under conditions of chosen message attack(CMA) and known message attack(KMA).Then two general constructions are presented with two concrete examples.We apply the SUEF secure signature schemes to an elementary authentication mechanism,the challenge-response mechanism,to obtain a basic deniable authentication method.The method is presented as a deniable message transmission(MT) authenticator in the extension framework of Raimondo.
引用
收藏
页码:98 / 111
页数:14
相关论文
共 50 条
  • [41] Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
    Yang, Wenjie
    Weng, Jian
    Luo, Weiqi
    Yang, Anjia
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [42] A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
    Luo, Fucai
    Wang, Fuqun
    Wang, Kunpeng
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2019, 480 : 70 - 89
  • [43] Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATICA, 2014, 25 (03) : 505 - 521
  • [44] Anonymous signature schemes
    Yang, Guomin
    Wong, Duncan S.
    Deng, Xiaotie
    Wang, Huaxiong
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 347 - 363
  • [45] Proxy signature schemes
    Lau, B. T.
    [J]. ICIEA 2006: 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, PROCEEDINGS, 2006, : 1462 - 1467
  • [46] Protean Signature Schemes
    Krenn, Stephan
    Poehls, Henrich C.
    Samelin, Kai
    Slamanig, Daniel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 256 - 276
  • [47] Proxy signature schemes
    Lau, B. T.
    [J]. 2006 1st IEEE Conference on Industrial Electronics and Applications, Vols 1-3, 2006, : 1196 - 1201
  • [48] List signature schemes
    Canard, S
    Schoenmakers, B
    Stam, M
    Traoré, J
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 189 - 201
  • [49] Security analysis of some threshold signature schemes and multi-signature schemes
    Cao, TJ
    Lin, DD
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 233 - 241
  • [50] Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model
    Pang, Liaojun
    Zhao, Huiyang
    Zhou, Xia
    Li, Huixian
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,