WEKO3
アイテム
Ring Signatures: Universally Composable Definitions and Constructions
https://ipsj.ixsq.nii.ac.jp/records/9822
https://ipsj.ixsq.nii.ac.jp/records/98228904154b-145b-44ac-9039-d4914d4156fe
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2007 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2007-09-15 | |||||||
タイトル | ||||||||
タイトル | Ring Signatures: Universally Composable Definitions and Constructions | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Ring Signatures: Universally Composable Definitions and Constructions | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | 特集:情報システムを支えるコンピュータセキュリティ技術の再考 | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
その他タイトル | ||||||||
その他のタイトル | セキュリティ基盤技術 | |||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者名 |
Kazuki, Yoneyama
× Kazuki, Yoneyama
|
|||||||
著者名(英) |
Kazuki, Yoneyama
× Kazuki, Yoneyama
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Though anonymity of ring signature schemes has been studied in many publications these papers gave different definitions and there has been no consensus. Recently Bender et al. proposed two new anonymity definitions of ring signature schemes which are stronger than the previous definitions that are called anonymity against attribution attacks/full key exposure. In addition ring signature schemes have two levels of definitions for unforgeability definitions i.e. existential unforgeability and strong existential unforgeability. In this paper we will redefine anonymities and unforgeabilities within the universally composable (UC) security framework. First we will give new ideal functionalities of ring signature schemes for each security level separately. Next we will show the relations between game-based security definitions and our UC definitions. Finally we will give another proof for the security of the Bender et al.’s ring signature scheme within the UC framework. A simulator we constructed in this proof can easily simulate an adversary of existential unforgeability which can be adaptable to the case of strong existential unforgeability if we assume the exploited signature scheme is a standard single strong existentially unforgeable signature scheme. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Though anonymity of ring signature schemes has been studied in many publications, these papers gave different definitions and there has been no consensus. Recently, Bender, et al. proposed two new anonymity definitions of ring signature schemes which are stronger than the previous definitions, that are called anonymity against attribution attacks/full key exposure. In addition, ring signature schemes have two levels of definitions for unforgeability definitions, i.e., existential unforgeability and strong existential unforgeability. In this paper, we will redefine anonymities and unforgeabilities within the universally composable (UC) security framework. First, we will give new ideal functionalities of ring signature schemes for each security level separately. Next, we will show the relations between game-based security definitions and our UC definitions. Finally, we will give another proof for the security of the Bender, et al.’s ring signature scheme within the UC framework. A simulator we constructed in this proof can easily simulate an adversary of existential unforgeability, which can be adaptable to the case of strong existential unforgeability if we assume the exploited signature scheme is a standard single strong existentially unforgeable signature scheme. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AN00116647 | |||||||
書誌情報 |
情報処理学会論文誌 巻 48, 号 9, p. 2976-2989, 発行日 2007-09-15 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-7764 |