中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
on the invisibility of designated confirmer signatures
作者: Xia Fubiao ; Wang Guilin ; Xue Rui
会议文集: Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
会议名称: 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
会议日期: March 22,
出版日期: 2011
会议地点: Hong Kong, China
关键词: Authentication ; Network security
出版地: United States
收录类别: EI
ISBN: 9781450305648
部门归属: (1) School of Computer Science, University of Birmingham, Birmingham, B15 2TT, United Kingdom; (2) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW 2522, Australia; (3) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Science, Beijing 100080, China
主办者: ACM Spec. Interest Group Secur., Audit, Control (SIGSAC)
英文摘要: As an important cryptographic primitive, designated confirmer signatures are introduced to control the public verifiability of signatures. That is, only the signer or a semi-trusted party, called designated confirmer, can interactively assist a verifier to check the validity of a designated confirmer signature. The central security property of a designated confirmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the validity of an alleged signature without direct cooperation from either the signer or the designated confirmer. However, in the literature researchers have proposed two other related properties, called impersonation and transcript simulatability, though the relations between them are not clear. In this paper, we first explore the relations among these three invisibility related concepts and conclude that invisibility, impersonation and transcript simulatability forms an increasing stronger order. After that, we turn to study the invisibility of two designated confirmer signature schemes recently presented by Zhang et al. and Wei et al. By demonstrating concrete and effective attacks, we show that both of those two scheme fail to meet invisibility, the central security property of designated confirmer signatures. Copyright 2011 ACM.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14255
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
on the invisibility of designated confirmer signatures.pdf(174KB)----限制开放-- 联系获取全文

Recommended Citation:
Xia Fubiao,Wang Guilin,Xue Rui. on the invisibility of designated confirmer signatures[C]. 见:6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Hong Kong, China. March 22,.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Xia Fubiao]'s Articles
[Wang Guilin]'s Articles
[Xue Rui]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Xia Fubiao]‘s Articles
[Wang Guilin]‘s Articles
[Xue Rui]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace