PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

ID-Based Digital Signatures with Security Enhanced Approach

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the paper the ID-based digital signatures with signer's protection in case of the private key compromising is investigated. The proposed protocols have two main ingredients. First is the application of the credential system for the suitable verification key approval. Second is the application of the subliminal channel together with the interactive generation of the secret key, to obtain the increased resistance of the system against the powerful adversary. The particular interest was turned towards the significance of the deniable encryption in creation of the corresponding protocols.
Słowa kluczowe
Rocznik
Tom
Strony
146--153
Opis fizyczny
Bibliogr. 21 poz.
Twórcy
autor
  • Institute of Mathematics, Faculty of Mathematics, Informatics and Mechanics, University of Warsaw, Banacha st 2, 02-097 Warsaw, Poland, pomykala@mimuw.edu.pl
Bibliografia
  • [1] K. Durnoga, J. Pomykała, and T. Trabszys, “Signature scheme with blackmail warning” (preprint).
  • [2] A. Shamir, “Identity-based cryptosystems and digital signatures”, in Proc. Crypto’87, Santa Barbara, USA, 1987, pp. 47–53.
  • [3] A. Joux, “A one-round protocol for tripartite Diffie-Hellman”, J. Cryptol., vol. 17, no. 4, pp. 263–276, 2004.
  • [4] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, SIAM J. Comp., vol. 32, no. 3, pp. 586–615, 2003.
  • [5] J. C. Cha and J. H. Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, LNCS, vol. 2567. Berlin: Springer, 2003, pp.18–30.
  • [6] R. Sakai and M. Kasahara, “ID based cryptosystems with pairing on elliptic curve”, in Symp. Cryptogr. Inform. Secur. SCIS’2003, Hamamatsu, Japan, 2003.
  • [7] X. Yi, “An identity based signature scheme from the Weil pairing”, IEEE Commun. Lett., vol. 7, no. 2, pp. 76–78, 2003.
  • [8] J. Pomykała and B. Źrałek, “A model of Id-based proxy signature scheme”, in Proc. 6th Coll. Iberoam. Collab. Electron. Commun. eCommerce Tech. Res. Conf., Madrid, Spain, 2008.
  • [9] M. Bellare, C. Namprempre, and G. Neven, Security Proofs for Identity-Based Identification and Signature Schemes, LNCS, vol. 3027. Berlin: Springer, 2004, pp. 268–286.
  • [10] G. J. Simmons, “The subliminal channel and digital signatures”, in Proc. EUROCRYPT’84Worksh. Adv. Cryptol. Theory Appl., Paris, France, 1985, pp. 364–378.
  • [11] J. Pomykała and T. Trabszys, “Blackmail warning verifiably encrypted signatures from bilinear pairing”, Bull. WAT, vol. LVII, no. 4, pp. 167–182, 2008.
  • [12] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, Deniable Encryption, LNCS, vol. 1294. Berlin: Springer, 1997, pp. 90–104.
  • [13] M. Klonowski, P. Kubiak, and M. Kutyłowski, Practical Deniable Encryption, LNCS, vol. 4910. Berlin: Springer, 2008, pp. 599–609.
  • [14] U. Feige, A. Fiat, and A. Shamir, “Zero-knowledge proofs of identity”, J. Cryptol., vol. 1, iss. 2, pp. 77–94, 1988.
  • [15] X. Cheng, J. Liu, and X. Wang, Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing, LNCS, vol. 3483. Berlin: Springer, 2005, pp. 1046–1054.
  • [16] R. Tamassia and D. Yao, “Cascaded authorization with anonymous – signer aggregated signatures”, in Proc. IEEE Inform. Assur. Worksh., Royal Holloway, UK, 2006, pp. 84–91.
  • [17] A. Boldyreva, A. Palacio, and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights”, Cryptol. ePrint Arch., 2003, Rep. 2003/096.
  • [18] A. Menezes, T. Okamoto, and S. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field”, IEEE Trans. Inform. Theory, vol. 39, pp. 1639–1646, 1993.
  • [19] V. S.Miller, “TheWeil pairing, and its efficient calculation”, J. Cryptol., vol. 17, no. 4, pp. 233–334, 2004.
  • [20] J. Pejaś, “ID-based directed threshold signcryption scheme using a bilinear pairing”, Polish J. Envir. Stud., vol. 17, no. 4C, pp. 335–341, 2008.
  • [21] J. Pomykała and B. Źrałek, “Electronic signature, development perspective”, in Electronic Signature and Biometric Authentication, B. Hołyst and J. Pomykała, Eds. Warsaw: WSM, 2009 – in print (in Polish).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0008-0019
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.