Formal security model of multisignatures

被引:0
|
作者
Komano, Yuichi
Ohta, Kazuo
Shimbo, Atsushi
Kawamura, Shinichi
机构
[1] Toshiba Co Ltd, Saiwai Ku, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
来源
关键词
multisignature scheme; formal security model; claw-free permutation; random oracle model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A multisignature scheme enables multiple signers to cooperate to generate one signature for some message. The aim of the multisignatures is to decrease the total length of the signature and/or the signing (verification) costs. This paper first discusses a formal security model of multisignatures following that of the group signatures [1,4]. This model allows an attacker against multisignatures to access five oracles adaptively. With this model, we can ensure more general security result than that with the existence model [14,11,12]. Second, we propose a multisignature scheme using a claw-free permutation. The proposed scheme can decrease the signature length compared to those of existence multisignature schemes using a trapdoor one-way permutation (TWOP) [11,12], because its signing does not require the random string. We also prove that the proposed scheme is tightly secure with the formal security model, in the random oracle model. Third, we discuss the security of the multisignature schemes [11,12] using a TOWP with the formal security model to confirm that these schemes can be proven to be tightly secure.
引用
收藏
页码:146 / 160
页数:15
相关论文
共 50 条
  • [1] Provably secure multisignatures in formal security model and their optimality
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 107 - 118
  • [2] Meeting Tight Security for Multisignatures in the Plain Public Key Model
    Yanai, Naoto
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1484 - 1493
  • [3] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [4] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, G
    [J]. FM'99-FORMAL METHODS, 1999, 1708 : 718 - 737
  • [5] A formal model for the grid security infrastructure
    Li, BY
    Rao, RN
    Li, ML
    You, JY
    [J]. WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 706 - 717
  • [6] Towards a Formal IoT Security Model
    Martin, Tania
    Geneiatakis, Dimitrios
    Kounelis, Ioannis
    Kerckhof, Stephanie
    Fovino, Igor Nai
    [J]. SYMMETRY-BASEL, 2020, 12 (08): : 1 - 16
  • [7] A Formal Multilevel Database Security Model
    Wang Baohua
    Ma Xinqiang
    Li Danning
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 815 - +
  • [8] A formal model of Healthcare Security Policy
    Cohen, B
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196
  • [9] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, GH
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (08) : 702 - 712
  • [10] Security pattern lattice: A formal model to organize security patterns
    Sarmah, Achyanta
    Hazarika, Shyamanta M.
    Sinha, Smriti K.
    [J]. DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 292 - 296