Provably secure multisignatures in formal security model and their optimality

被引:3
|
作者
Komano, Yuichi [1 ]
Ohta, Kazuo [2 ]
Shimbo, Atsushi [1 ]
Kawamura, Shinichi [1 ]
机构
[1] Toshiba Co Ltd, Ctr Corp Res & Dev, Kawasaki, Kanagawa 2128585, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
关键词
multisignatures; trapdoor one-way permutation (TOWP); claw-free permutation (CFP); provably secure; random oracle model;
D O I
10.1093/ietfec/e91-a.1.107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We first model the formal security model of multisignature scheme following that of group signature scheme. Second, we prove that the following three probabilistic multisignature schemes based on a trapdoor permutation have tight security; PFDH (probabilistic full domain hash) based multisignature scheme (PFDH-MSS), PSS (probabilistic signature scheme) based multisignature scheme (PSS-MSS), and short signature PSS based multisignature scheme (S-PSS-MSS). Third, we give an optimal proof (general result) for multisignature schemes, which derives the lower bound for the length of random salt. We also estimate the upper bound for the length in each scheme and derive the optimal length of a random salt. Two of the schemes are promising in terms of security tightness and optimal signature length. In appendix, we describe a multisignature scheme using the claw-free permutation and discuss its security.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [1] Formal security model of multisignatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 146 - 160
  • [2] Updatable Tokenization: Formal Definitions and Provably Secure Constructions
    Cachin, Christian
    Camenisch, Jan
    Freire-Stogbuchner, Eduarda
    Lehmann, Anja
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 59 - 75
  • [3] Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
    Shen, Limin
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Hai
    [J]. IET INFORMATION SECURITY, 2019, 13 (03) : 167 - 173
  • [4] Another Efficient Provably Secure Designated Verifier Signature Scheme In the Standard Security Model
    Zhang, Hanhong
    Geng, Qin
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 287 - 291
  • [5] A Model for Provably Secure Software Design
    van den Berghe, Alexander
    Yskout, Koen
    Joosen, Wouter
    Scandariato, Riccardo
    [J]. 2017 IEEE/ACM 5TH INTERNATIONAL FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE) PROCEEDINGS, 2017, : 3 - 9
  • [6] Meeting Tight Security for Multisignatures in the Plain Public Key Model
    Yanai, Naoto
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1484 - 1493
  • [7] Towards Provably Secure Logic Locking for Hardening Hardware Security
    Yasin, Muhammad
    Sinanoglu, Ozgur
    [J]. 2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
  • [8] Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model
    Yuan, Ke
    Wang, Yahui
    Zeng, Yingming
    Ouyang, Wenlei
    Li, Zheng
    Jia, Chunfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Provably secure model for group key exchange
    Cao, Chunjie
    Ma, Hanfeng
    Moon, Sanglae
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1380 - 1385
  • [10] Secure acknowledgment aggregation and multisignatures with limited robustness
    Castelluccia, Claude
    Jarecki, Stanislaw
    Kim, Jihye
    Tsudik, Gene
    [J]. COMPUTER NETWORKS, 2006, 50 (10) : 1639 - 1652