期刊文献+

基于证人不可区分的通用可复合安全并行可否认认证 被引量:5

Universally Composable Security Concurrent Deniable Authentication Based on Witness Indistinguishable
在线阅读 下载PDF
导出
摘要 针对并行可否认认证问题,在UC(universally composable)安全框架中,基于WI(witnessindistinguishable)提出了一种新的研究思路和解决方法.根据可否认认证的安全目标,形式化地建立了UC安全的并行可否认认证模型.利用可验证平滑投影哈希函数和非承诺加密体制,构造了一类新的并行可否认认证协议结构,基于确定性复合剩余假设和确定性Diffie-Hellman假设,实现了一个具体的协议方案.在公共参考串模型中,利用UC框架解决并行协议仿真问题与定时假设和公共目录方案相比,不需要限定攻击者能力.新方案具备前向可否认性,是自适应攻击者UC安全的.不同于CCA2加密体制结构或多陷门承诺结构的并行可否认认证,协议效率得到了改善. A new approach and an idea for exploration are presented to the concurrent deniable authentication based on witness-indistinguishable (WI) within the framework of universally composable (UC) security. A definition of an ideal functionality for deniable authentication is formulated. A new deniable authentication protocol is proposed based on two primitives of the verifiably smooth projective Hashing (VSPH) and non-committing encryptions (NCE). This new approach is practically relevant to VSPH based on the Decisional Diffie-Hellman (DDH) assumption and NCE based on the decisional composite residuosity (DCR) assumption. Compared with a timing constraint and public directory model, simulation of the concurrent protocols is not needed to restrict an adversary capability in a common reference string (CRS) model. The protocols are forward deniable and UC security against adaptive adversaries. Unlike previous proposals with the CCA2 public-key cryptosystem or multi-trapdoor commitments paradigm, the new paradigm leads to more efficient protocols.
作者 冯涛 马建峰
出处 《软件学报》 EI CSCD 北大核心 2007年第11期2871-2881,共11页 Journal of Software
基金 Nos.60573036 60633020(国家自然科学基金)~~
关键词 信息安全:并行可否认认证 通用可复合安全 证人不可区分 可验证平滑投影哈希函数 information security concurrent deniable authentication universally composable security witnessindistinguishable verifiably smooth projective Hashing
  • 相关文献

参考文献1

共引文献9

同被引文献33

  • 1季晓君,田畅,张毓森.MANET路由协议安全分析[J].应用科学学报,2007,25(1):30-34. 被引量:4
  • 2ZHANG Fan,MA JianFeng,SangJae MOON.Universally composable anonymous Hash certification model[J].Science in China(Series F),2007,50(3):440-455. 被引量:9
  • 3李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 4Canetti R, Dwork C,Naor M, et al.Deniable encryption[C].Proceedings of Crypto, 1997.
  • 5Dwork C,Naor M,Sahari A.Concurrent zero knowledge[C].Proceedings of the 30th STOC,1998,.
  • 6Jiang S,Safavi-Naini R.An efficient fully deniable key exchange protocol,financial cryptography and data security[C]. 12th International Conference,2008.
  • 7Shao Z.Efficient deniable authentication protocol based on generalized E1Gamal signature scheme[J].Computer Standards and Interfaces,2004,26:449-454.
  • 8Mu Y, Zhang F, Susilo W.Deniable partial proxy signatures[C]. ASIAN,2004:182-194.
  • 9Boyd C,Mao W, Kenneth G Paterson.Deniable authenticated key establishment for intemet protocols[C].Security Protocols,2005: 255-271.
  • 10Cao T, Dai L,Xue R.An efficient ID-based deniable authentication protocol from pairings[C].Proceedings of the 19th International Conference on Advanced Information Networking and Applications,2005.

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部