【24h】

On the Security Models of (Threshold) Ring Signature Schemes

机译:关于(阈值)环签名方案的安全模型

获取原文
获取原文并翻译 | 示例

摘要

We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. and Abe et al.. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al., which have been proven secure in the weakest model (the one specified by Rivest et al.), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al.). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.
机译:我们对安全模型进行了细微的区分,以证明可证明的安全环签名方案。当前,Rivest等人指定了两种常用的安全模型。和Abe等人。它们提供不同级别的安全性。在本文中,我们介绍了一个新的但兼容的模型,其安全级别可以认为位于这两个常用模型之间。在安全模型上进行细粒度的区分很重要,因为某些方案在某些模型中可能是安全的,而在其他模型中则不是。特别是,我们表明Boneh等人的基于双线性图的环签名方案已在最弱模型(Rivest等人指定的模型)中被证明是安全的,但在更强模型(指定的新模型)中实际上是不安全的由我们在本文中以及由Abe等人指定)。我们还为两个更强大的模型中的每个模型建议对其方案进行安全修改。此外,我们提出了一种使用双线性映射的阈值环签名方案,并在本文定义的最强模型中展示了其对自适应对手的安全性。在整个本文中,我们在随机预言假设下进行了所有安全性分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号