Title: | on the invisibility of designated confirmer signatures |
Author: | Xia Fubiao
; Wang Guilin
; Xue Rui
|
Source: | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
|
Conference Name: | 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
|
Conference Date: | March 22,
|
Issued Date: | 2011
|
Conference Place: | Hong Kong, China
|
Keyword: | Authentication
; Network security
|
Publish Place: | United States
|
Indexed Type: | EI
|
ISBN: | 9781450305648
|
Department: | (1) School of Computer Science, University of Birmingham, Birmingham, B15 2TT, United Kingdom; (2) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW 2522, Australia; (3) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Science, Beijing 100080, China
|
Sponsorship: | ACM Spec. Interest Group Secur., Audit, Control (SIGSAC)
|
English Abstract: | As an important cryptographic primitive, designated confirmer signatures are introduced to control the public verifiability of signatures. That is, only the signer or a semi-trusted party, called designated confirmer, can interactively assist a verifier to check the validity of a designated confirmer signature. The central security property of a designated confirmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the validity of an alleged signature without direct cooperation from either the signer or the designated confirmer. However, in the literature researchers have proposed two other related properties, called impersonation and transcript simulatability, though the relations between them are not clear. In this paper, we first explore the relations among these three invisibility related concepts and conclude that invisibility, impersonation and transcript simulatability forms an increasing stronger order. After that, we turn to study the invisibility of two designated confirmer signature schemes recently presented by Zhang et al. and Wei et al. By demonstrating concrete and effective attacks, we show that both of those two scheme fail to meet invisibility, the central security property of designated confirmer signatures. Copyright 2011 ACM. |
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/14255
|
Appears in Collections: | 信息安全国家重点实验室_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
on the invisibility of designated confirmer signatures.pdf(174KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Xia Fubiao,Wang Guilin,Xue Rui. on the invisibility of designated confirmer signatures[C]. 见:6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Hong Kong, China. March 22,.
|
|
|