Identyfikatory
Warianty tytułu
Zaawansowany schemat podpisu cyfrowego opartego na tożsamości
Języki publikacji
Abstrakty
In the paper we present the design of new digital signature protocol with the secretly hidden warning in the Gap Diffie-Hellman group. The proposed scheme is the extended Id based protocol applying the idea of Schnorr signature and the subliminal channel defined by Simmons.
W pracy przedstawiono projekt nowego protokołu cyfrowego podpisu z ukrytym ostrzeżeniem wykorzystujący grupę DiffiegoHellmana z luką obliczeniowo-decyzyjną. Proponowany schemat jest oparty na rozszerzonym protokole podpisu bazującego na tożsamości i wykorzystuje schemat C. P Schnorra i ideę kanału podprogowego zainicjowaną przez G. Simmonsa.
Wydawca
Czasopismo
Rocznik
Tom
Strony
113--116
Opis fizyczny
Bibliogr. 24 poz.
Twórcy
autor
- Wydziału Matematyki Informatyki i Mechaniki Uniwersytetu Warszawskiego, ul. Banacha 2, 02-097 Warszawa
Bibliografia
- [1] A. Shamir, Identity-based cryptosystems and digital signatures, in Proc. Crypto’87, Santa Barbara, USA, 1987, pp. 47–53.
- [2] A. Joux, A one-round protocol for tripartite Diffie-Hellman, J. Cryptol., vol. 17, no. 4, pp. 263–276, 2004.
- [3] D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comp., vol. 32, no. 3, pp. 586–615, 2003.
- [4] J. Pomykała and B. Źrałek, A model of Id-based proxy signature scheme, in Proc. 6th Coll. Iberoam. Collab. Electron. Commun. eCommerce Tech. Res. Conf., Madrid, Spain, 2008.
- [5] M. Bellare, C. Namprempre, and G. Neven, Security Proofs for Identity-Based Identification and Signature Schemes, LNCS,vol. 3027. Berlin: Springer, 2004, pp. 268–286.
- [6] G. J. Simmons, The subliminal channel and digital signatures, in Proc. EUROCRYPT’84Worksh. Adv. Cryptol. Theory Appl., Paris,France, 1985, pp. 364–378.
- [7] J. Pomykała and T. Trabszys, Blackmail warning verifiably encrypted signatures from bilinear pairing, Bull. WAT, vol. LVII,no. 4, pp. 167–182, 2008.
- [8] K. Durnoga, J. Pomykała, and T. Trabszys, Digital signature scheme with secretly embedded warning, to appear in Control and Cybernetics, vol. 4 2013
- [9] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, Deniable Encryption,LNCS, vol. 1294. Berlin: Springer, 1997, pp. 90–104.
- [10] P. Kubiak, M. Kutyłowski, Litweight digital signature with secretly embedded warning, to appear in Control and Cybernetics, vol. 4( 2013).
- [11] T. Hyla, J. Pejaś, A practical certificate and identity based encryption scheme and related security architecture, LNCS, vol. 8104, 2013 , s. 178-193
- [12] J. Pomykała, ID-based digital signatures with security enhanced approach, Journal of Telecommunication and information technology, no 4 (2009).
- [13] Claus P. Schnorr. Efficient Identification and Signatures for Smart Cards, Proceedings of CRYPTO '89.
- [14] R. Sakai, M. Kasahara, ID based cryptosystems with pairing on elliptic curve, in Symp. Cryptogr. Inform. Secur. SCIS’2003, Hamamatsu, Japan, 2003.
- [15] J. Pomykała, B. Źrałek, Dynamic group threshold signature based on derandomized Weil Pairng. Metody Informatyki Stosowanej 17(4), s. 183-193, Polska Akademia Nauk Oddział w Gdańsku, 2008.
- [16] M. Mambo, K. Usuda, and E. Okamoto, Proxy Signatures for Delegating SigningOperation, 3rd ACM Conference on Computer and Communications Security (CCS ’96) (1996), 48–57.
- [17] A. Boldyreva, A. Palacio, and B. Warinschi, Secure Proxy Signature Schemes for Delegation of Signing Rights (2003), available at http://eprint.iacr.org/2003/096.
- [18] D. Chaum and E. van Heyst, Group Signatures, Advances in Cryptology – Eurocrypt’91 (2003), 257–265.
- [19] M. Bellare, D. Micciancio, and B. Warinschi, Foundations of Group Signatures:Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, Advances in Cryptology – Eurocrypt ’03 2656 (2003),
- [20] D Yao and R. Tamassia, Cascaded Authorization with Anonymous-Signer Aggregate Signatures, Information Assurance Workshop, 2006 IEEE (2006), 84–91.
- [21] D. Boneh and C. Gentry, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Advances in Cryptology – Eurocrypt ’03 2656 (2003), 416–432.
- [22] M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, Proceedings of the 1st ACM conference on Computer and communications security, 1993, pp. 62–73.
- [23] U. Feige, A. Fiat, and A. Shamir, Zero Knowledge Proof of Identity, Journal of Cryptologyc1, 1988, 77-94.
- [24] B. Hołyst and J. Pomykała, Electronic Signature and Biometric Methods of Identification (in Polish), WSM publications, ISSN 978-83-7520-042-3, Warsaw (2010).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-16ce0ec4-0387-41d9-baff-91a7df80cac0