書誌事項
- タイトル別名
-
- セキュリティ基盤技術
この論文をさがす
説明
Though anonymity of ring signature schemes has been studied in many publications these papers gave different definitions and there has been no consensus. Recently Bender et al. proposed two new anonymity definitions of ring signature schemes which are stronger than the previous definitions that are called anonymity against attribution attacks/full key exposure. In addition ring signature schemes have two levels of definitions for unforgeability definitions i.e. existential unforgeability and strong existential unforgeability. In this paper we will redefine anonymities and unforgeabilities within the universally composable (UC) security framework. First we will give new ideal functionalities of ring signature schemes for each security level separately. Next we will show the relations between game-based security definitions and our UC definitions. Finally we will give another proof for the security of the Bender et al.’s ring signature scheme within the UC framework. A simulator we constructed in this proof can easily simulate an adversary of existential unforgeability which can be adaptable to the case of strong existential unforgeability if we assume the exploited signature scheme is a standard single strong existentially unforgeable signature scheme.
Though anonymity of ring signature schemes has been studied in many publications, these papers gave different definitions and there has been no consensus. Recently, Bender, et al. proposed two new anonymity definitions of ring signature schemes which are stronger than the previous definitions, that are called anonymity against attribution attacks/full key exposure. In addition, ring signature schemes have two levels of definitions for unforgeability definitions, i.e., existential unforgeability and strong existential unforgeability. In this paper, we will redefine anonymities and unforgeabilities within the universally composable (UC) security framework. First, we will give new ideal functionalities of ring signature schemes for each security level separately. Next, we will show the relations between game-based security definitions and our UC definitions. Finally, we will give another proof for the security of the Bender, et al.’s ring signature scheme within the UC framework. A simulator we constructed in this proof can easily simulate an adversary of existential unforgeability, which can be adaptable to the case of strong existential unforgeability if we assume the exploited signature scheme is a standard single strong existentially unforgeable signature scheme.
収録刊行物
-
- 情報処理学会論文誌
-
情報処理学会論文誌 48 (9), 2976-2989, 2007-09-15
東京 : 情報処理学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1050282812859123840
-
- NII論文ID
- 110006422979
-
- NII書誌ID
- AN00116647
-
- ISSN
- 18827764
- 03875806
-
- NDL書誌ID
- 8949425
-
- 本文言語コード
- en
-
- 資料種別
- journal article
-
- データソース種別
-
- IRDB
- NDLサーチ
- CiNii Articles
- KAKEN