Asymmetric Group Message Franking: Definitions and Constructions

被引:0
|
作者
Lai, Junzuo [1 ]
Zeng, Gongxian [2 ]
Huang, Zhengan [2 ]
Yiu, Siu Ming [3 ]
Mu, Xin [2 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Shenzhen, Peoples R China
[3] Univ Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Message franking; Hash proof system; Key encapsulation mechanism; Signature of knowledge; IDENTIFICATION;
D O I
10.1007/978-3-031-30589-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As online group communication scenarios become more and more common these years, malicious or unpleasant messages are much easier to spread on the internet. Message franking is a crucial cryptographic mechanism designed for content moderation in online end-toend messaging systems, allowing the receiver of a malicious message to report the message to the moderator. Unfortunately, the existing message franking schemes only consider 1-1 communication scenarios. In this paper, we systematically explore message franking in group communication scenarios. We introduce the notion of asymmetric group message franking (AGMF), and formalize its security requirements. Then, we provide a framework of constructing AGMF from a new primitive, called HPS-KEM Sigma. We also give a construction of HPS-KEM Sigma based on the DDH assumption. Plugging the concrete HPS-KEM Sigma scheme into our AGMF framework, we obtain a DDH-based AGMF scheme, which supports message franking in group communication scenarios.
引用
收藏
页码:67 / 97
页数:31
相关论文
共 50 条
  • [21] Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
    Ahn, Jae Hyun
    Green, Matthew
    Hohenberger, Susan
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 473 - 484
  • [22] Computing on Authenticated Data: New Privacy Definitions and Constructions
    Attrapadung, Nuttapong
    Libert, Benoit
    Peters, Thomas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 367 - 385
  • [23] Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
    Camenisch, Jan
    Dubovitskaya, Maria
    Haralambiev, Kristiyan
    Kohlweiss, Markulf
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 262 - 288
  • [24] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934
  • [25] Attribute-Based Identification: Definitions and Efficient Constructions
    Anada, Hiroaki
    Arita, Seiko
    Handa, Sari
    Iwabuchi, Yosuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (05) : 1086 - 1102
  • [26] Alternatives to non-melleability: Definitions, constructions, and applications
    MacKenzie, P
    Reiter, MK
    Yang, K
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 171 - 190
  • [27] Group + Definitions for folklorists
    Noyes, D
    JOURNAL OF AMERICAN FOLKLORE, 1995, 108 (430) : 449 - 478
  • [28] INFORMATION NETWORKS - DEFINITIONS AND MESSAGE TRANSFER MODELS
    NANCE, RE
    BHAT, UN
    KORFHAGE, RR
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1972, 23 (04): : 237 - &
  • [29] President's message: Applications, definitions, transitions
    IEEE Control Syst Mag, 2009, 6 (11-13):
  • [30] Constructions of Asymmetric Quantum Alternant Codes
    Fan, Jihao
    Chen, Hanwu
    Xu, Juan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (01) : 313 - 328