Fail-stop signatures

被引:35
|
作者
Pedersen, TP
Pfitzmann, B
机构
[1] UNIV HILDESHEIM, INST INFORMAT, D-31141 HILDESHEIM, GERMANY
[2] AARHUS UNIV, DEPT COMP SCI, DK-8000 AARHUS, DENMARK
关键词
cryptography; authentication; digital signatures; fail-stop; discrete logarithm; factorization; randomization; computational security; information-theoretic security;
D O I
10.1137/S009753979324557X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fail-stop signatures can briefly be characterized as digital signatures that allow the signer to prove that a given forged signature is indeed a forgery. After such a proof has been published, the system can be stopped. This type of security is strictly stronger than that achievable with ordinary digital signatures as introduced by Diffie and Hellman in 1976 and formally defined by Goldwasser, Micali, and Rivest in 1988, which was widely regarded as the strongest possible definition. This paper formally defines fail-stop signatures and shows their relation to ordinary digital signatures. A general construction and actual schemes derived from it follow. They are efficient enough to be used in practice. Next, we prove lower bounds on the efficiency of any fail-stop signature scheme. In particular, we show that the number of secret random bits needed by the signer, the only parameter where the complexity of all our constructions deviates from ordinary digital signatures by more than a small constant factor, cannot be reduced significantly.
引用
收藏
页码:291 / 330
页数:40
相关论文
共 50 条
  • [41] A Smart Grid Privacy Protection Scheme Based on Short Fail-Stop Signature
    Xu, Shumei
    Yang, Ningbin
    Zhou, Quan
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 258 - 266
  • [42] FAIL-STOP PROCESSORS - AN APPROACH TO DESIGNING FAULT-TOLERANT COMPUTING SYSTEMS
    SCHLICHTING, RD
    SCHNEIDER, FB
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 222 - 238
  • [43] Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (8-10) : 736 - 744
  • [44] 一种新的Fail-stop盲签名方案
    何金妮
    辛小龙
    高师理科学刊, 2010, 30 (03) : 15 - 16+19
  • [45] Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature
    Lim, JongBeom
    Yu, HeonChang
    Gil, Joon-Min
    SYMMETRY-BASEL, 2017, 9 (03):
  • [46] Reliability of task graph schedules with transient and fail-stop failures: complexity and algorithms
    Anne Benoit
    Louis-Claude Canon
    Emmanuel Jeannot
    Yves Robert
    Journal of Scheduling, 2012, 15 : 615 - 627
  • [47] Reliability of task graph schedules with transient and fail-stop failures: complexity and algorithms
    Benoit, Anne
    Canon, Louis-Claude
    Jeannot, Emmanuel
    Robert, Yves
    JOURNAL OF SCHEDULING, 2012, 15 (05) : 615 - 627
  • [48] Mitigation Of Fail-Stop Failures In Integer Matrix Products Via Numerical Packing
    Anarado, Ijeoma
    Andreopoulos, Yiannis
    2015 IEEE 21ST INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2015, : 101 - 107
  • [49] On-chip IDDQ testing in the AE11 fail-stop controller
    Bohl, E
    Lindenkreuz, T
    Meerwein, M
    IEEE DESIGN & TEST OF COMPUTERS, 1998, 15 (04): : 57 - 65
  • [50] Fail-Stop Failure Algorithm-Based Fault Tolerance for Cholesky Decomposition
    Hakkarinen, Doug
    Wu, Panruo
    Chen, Zizhong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) : 1323 - 1335