Fail-stop signatures

被引:35
|
作者
Pedersen, TP
Pfitzmann, B
机构
[1] UNIV HILDESHEIM, INST INFORMAT, D-31141 HILDESHEIM, GERMANY
[2] AARHUS UNIV, DEPT COMP SCI, DK-8000 AARHUS, DENMARK
关键词
cryptography; authentication; digital signatures; fail-stop; discrete logarithm; factorization; randomization; computational security; information-theoretic security;
D O I
10.1137/S009753979324557X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fail-stop signatures can briefly be characterized as digital signatures that allow the signer to prove that a given forged signature is indeed a forgery. After such a proof has been published, the system can be stopped. This type of security is strictly stronger than that achievable with ordinary digital signatures as introduced by Diffie and Hellman in 1976 and formally defined by Goldwasser, Micali, and Rivest in 1988, which was widely regarded as the strongest possible definition. This paper formally defines fail-stop signatures and shows their relation to ordinary digital signatures. A general construction and actual schemes derived from it follow. They are efficient enough to be used in practice. Next, we prove lower bounds on the efficiency of any fail-stop signature scheme. In particular, we show that the number of secret random bits needed by the signer, the only parameter where the complexity of all our constructions deviates from ordinary digital signatures by more than a small constant factor, cannot be reduced significantly.
引用
收藏
页码:291 / 330
页数:40
相关论文
共 50 条
  • [1] On the security for the fail-stop digital signatures
    Zhang, QH
    Zheng, JM
    Yang, CD
    WAVELET ANALYSIS AND ITS APPLICATIONS (WAA), VOLS 1 AND 2, 2003, : 814 - 820
  • [2] Extremely Simple Fail-Stop ECDSA Signatures
    Yaksetig, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 230 - 234
  • [3] Efficient Fail-Stop Signatures from the Factoring Assumption
    Mashatan, Atefeh
    Ouafi, Khaled
    INFORMATION SECURITY, 2011, 7001 : 372 - 385
  • [4] Factorization-based fail-stop signatures revisited
    Schmidt-Samoa, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 118 - 131
  • [5] Constructions of Fail-Stop Signatures for Multi-Signer Setting
    Kitajima, Nobuaki
    Yanai, Naoto
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 112 - 123
  • [6] On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    Damgard, IB
    Pedersen, TP
    Pfitzmann, B
    JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 163 - 194
  • [7] On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    Ivan B. Damgård
    Torben P. Pedersen
    Birgit Pfitzmann
    Journal of Cryptology, 1997, 10 : 163 - 194
  • [8] That's Not My Signature! Fail-Stop Signatures for a Post-quantum World
    Boschini, Cecilia
    Dahari, Hila
    Naor, Moni
    Ronen, Eyal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 107 - 140
  • [9] Assured reconfiguration of fail-stop systems
    Strunk, EA
    Knight, JC
    Aiello, MA
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 2 - 11
  • [10] Checkpointing Workflows for Fail-Stop Errors
    Han, Li
    Canon, Louis-Claude
    Casanova, Henri
    Robert, Yves
    Vivien, Frederic
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (08) : 1105 - 1120