Formal security model of multisignatures

被引:0
|
作者
Komano, Yuichi
Ohta, Kazuo
Shimbo, Atsushi
Kawamura, Shinichi
机构
[1] Toshiba Co Ltd, Saiwai Ku, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
来源
关键词
multisignature scheme; formal security model; claw-free permutation; random oracle model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A multisignature scheme enables multiple signers to cooperate to generate one signature for some message. The aim of the multisignatures is to decrease the total length of the signature and/or the signing (verification) costs. This paper first discusses a formal security model of multisignatures following that of the group signatures [1,4]. This model allows an attacker against multisignatures to access five oracles adaptively. With this model, we can ensure more general security result than that with the existence model [14,11,12]. Second, we propose a multisignature scheme using a claw-free permutation. The proposed scheme can decrease the signature length compared to those of existence multisignature schemes using a trapdoor one-way permutation (TWOP) [11,12], because its signing does not require the random string. We also prove that the proposed scheme is tightly secure with the formal security model, in the random oracle model. Third, we discuss the security of the multisignature schemes [11,12] using a TOWP with the formal security model to confirm that these schemes can be proven to be tightly secure.
引用
收藏
页码:146 / 160
页数:15
相关论文
共 50 条
  • [21] A Formal Model for Security Analysis of Trust and Reputation systems
    Ghasempouri, Seyed Asgary
    Ladani, Behrouz Tork
    [J]. 2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 13 - 18
  • [22] Formal verification of security model using SPR tool
    Kim, Il-Gon
    Kang, Miyoung
    Choi, Jin-Young
    Zegzhda, Peter D.
    Kalinin, Maxim O.
    Zegzhda, Dmitry P.
    Kang, Inhye
    [J]. COMPUTING AND INFORMATICS, 2006, 25 (05) : 353 - 368
  • [23] Toward a Formal Traceability Model for Efficient Security Validation
    Ebert, Christof
    Ray, Ruschil
    [J]. COMPUTER, 2021, 54 (11) : 68 - 78
  • [24] Verification of a formal security model for multiapplicative smart cards
    Schellhorn, G
    Reif, W
    Schairer, A
    Karger, P
    Austel, V
    Toll, D
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 17 - 36
  • [25] A formal model for network-wide security analysis
    Matousek, Petr
    Rab, Jaroslav
    Rysavy, Ondrej
    Sveda, Miroslav
    [J]. FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2008, : 171 - 181
  • [26] A Unified Formal Model for Proving Security and Reliability Properties
    Hu, Wei
    Wu, Lingjuan
    Tai, Yu
    Tan, Jing
    Zhang, Jiliang
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 30 - 35
  • [27] Using Refinement in Formal Development of OS Security Model
    Devyanin, Petr N.
    Khoroshilov, Alexey V.
    Kuliamin, Victor V.
    Petrenko, Alexander K.
    Shchepetkov, Ilya V.
    [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 107 - 115
  • [28] Development of A Formal Security Model for Electronic Voting Systems
    Braeunlich, Katharina
    Grimm, Ruediger
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (02) : 1 - 28
  • [29] Cryptography as a formal method and model for security in electronic payments
    Tsiakis, T
    Stephanides, G
    Pekos, G
    [J]. INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 235 - 242
  • [30] A Reinforcement Model for Collaborative Security and Its Formal Analysis
    Misra, Janardan
    Saha, Indranil
    [J]. NEW SECURITY PARADIGMS WORKSHOP 2009, PROCEEDINGS, 2009, : 101 - 114