期刊文献+

主动攻击下数字签名的计算可靠性 被引量:1

Computational Soundness of Digital Signature in Presence of Active Adversaries
下载PDF
导出
摘要 研究在密码协议仅使用数字签名原语时,主动攻击下符号形式化分析系统的计算可靠性。借鉴Micciancio-Warinschi方法,分别引入符号模型和计算模型中的协议运行状态集合,通过反证法证明符号模型中的迹与计算模型中的迹之间的对应关系,建立数字签名的计算可靠性,即如数字签名方案满足N-UNF,则符号模型所得到的结果在计算模型中也是正确的。基于该结论,可以构建具有计算可靠性的形式化分析系统。 This paper extends previous results bridging the gap between the symbol approach and the computational approach. Specifically, for the case of protocols that use signatures, based on the Micciancio-Warinschi method, the soundness of digital signature with respect to the computational model is established, Le. if digital signature scheme is N-UNF, then the results obtained form the symbolic model carry over to the computational model. Based on this conclusion, a formal system with computational soundness can be consructed.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第17期170-172,共3页 Computer Engineering
关键词 密码协议 数字签名 计算可靠性 cryptographic protocols digital signature computational soundness
  • 相关文献

参考文献4

  • 1Abadi M, Rogaway P. Reconciling Two Views of Cryptography(The Computational Soundness of Formal Encryption)[C]//Proc. of the 1st International Conference on Theoretical Computer Science.[S. l.]: Springer, 2000: 3-22. 被引量:1
  • 2Micciancio D, Warinschi B. Completeness Theorems for the Abadi-Rogaway Logic of Encrypted Expressions[J]. Journal of Computer Security, 2004, 12(1 ): 99-129. 被引量:1
  • 3Micciancio D, Warinschi B. Soundness of Formal Encryption in the Presence of Active Adversaries[C]//Proc. of the Theory of Cryptography Conference. Cambridge, Massachusetts, UK: [s. n.], 2004: 133-151. 被引量:1
  • 4Lakhnech Y, Janvier R, Mazare L Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries[C]//Proc. of the 14th European Symposium on Programming. [S. l.]: Springer-Verlag, 2005: 172-185. 被引量:1

同被引文献5

  • 1Zheng Yi. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature)+Cost(Encryption)[C]//Proceedings of CRYPTO'97. Santa Barbara, California, USA: [s. n.], 1997. 被引量:1
  • 2Asokan N, Shoup V, Waidner M. Optimistic Fair Exchange of Digital Signatures[C]//Proc. of EUROCRYPT'98. Espoo, Finland: [s. n.], 1998. 被引量:1
  • 3Bellare M, Rogaway E Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols[C]//Proc. of the 1st ACM Conference on Computer and Communications Security. Fairfax, Virginia, USA: ACM Press, 1993: 62-73. 被引量:1
  • 4Boneh D, Boyen X. Short Signatures Without Random Oracles[C]// Proc. of EUROCRYPT'04. Interlaken, Switzerland: [s. n.], 2004. 被引量:1
  • 5Zhang Fangguo, Safavi-Naini R, Susilo W. An Efficient Signature Scheme from Bilinear Pairings and Its Applications[C]//Proc. of ,PKC'04. Singapore: [s. n.], 2004. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部