Unconditionally Secure Blind Signatures

被引:0
|
作者
Hara, Yuki [1 ]
Seito, Takenobu [1 ]
Shikata, Junji [1 ]
Matsumoto, Tsutomu [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blind signature scheme introduced by Chaum allows a. user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computational security so far. In this paper, we study blind signatures in unconditional setting. Specifically, we newly introduce a model of unconditionally secure blind signature schemes (USBS, for short). Also, we propose security notions and their formalization in our model. Finally, we propose a construction method for USBS that is provably secure in our security notions.
引用
收藏
页码:23 / 43
页数:21
相关论文
共 50 条
  • [41] Unconditionally Secure Computation with Reduced Interaction
    Damgard, Ivan
    Nielsen, Jesper Buus
    Ostrovsky, Rafail
    Rosen, Adi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 420 - 447
  • [42] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [43] Fast and Unconditionally Secure Anonymous Channel
    Garay, Juan
    Givens, Clint
    Ostrovsky, Rafail
    Raykov, Pavel
    [J]. PROCEEDINGS OF THE 2014 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'14), 2014, : 313 - 321
  • [44] Unconditionally Secure Approximate Message Authentication
    Tonien, Dongvu
    Safavi-Naini, Reihaneh
    Nickolas, Peter
    Desmedt, Yvo
    [J]. CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 233 - +
  • [45] Unconditionally secure signature schemes revisited
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2016, 10 (01) : 35 - 67
  • [46] On the Communication Required for Unconditionally Secure Multiplication
    Damgard, Ivan
    Nielsen, Jesper Buus
    Polychroniadou, Antigoni
    Raskin, Michael
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 459 - 488
  • [47] The role of arbiters for unconditionally secure authentication
    Hanaoka, G
    Shikata, J
    Hanaoka, Y
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1132 - 1140
  • [48] Unconditionally secure key assignment schemes
    De Santis, A
    Ferrara, AL
    Masucci, B
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 234 - 252
  • [49] ARBITRATED UNCONDITIONALLY SECURE AUTHENTICATION CAN BE UNCONDITIONALLY PROTECTED AGAINST ARBITER ATTACKS
    DESMEDT, Y
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 177 - 188
  • [50] A secure three-move blind signature scheme for polynomially many signatures
    Abe, M
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 136 - 151