Fail-stop signatures

被引:35
|
作者
Pedersen, TP
Pfitzmann, B
机构
[1] UNIV HILDESHEIM, INST INFORMAT, D-31141 HILDESHEIM, GERMANY
[2] AARHUS UNIV, DEPT COMP SCI, DK-8000 AARHUS, DENMARK
关键词
cryptography; authentication; digital signatures; fail-stop; discrete logarithm; factorization; randomization; computational security; information-theoretic security;
D O I
10.1137/S009753979324557X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fail-stop signatures can briefly be characterized as digital signatures that allow the signer to prove that a given forged signature is indeed a forgery. After such a proof has been published, the system can be stopped. This type of security is strictly stronger than that achievable with ordinary digital signatures as introduced by Diffie and Hellman in 1976 and formally defined by Goldwasser, Micali, and Rivest in 1988, which was widely regarded as the strongest possible definition. This paper formally defines fail-stop signatures and shows their relation to ordinary digital signatures. A general construction and actual schemes derived from it follow. They are efficient enough to be used in practice. Next, we prove lower bounds on the efficiency of any fail-stop signature scheme. In particular, we show that the number of secret random bits needed by the signer, the only parameter where the complexity of all our constructions deviates from ordinary digital signatures by more than a small constant factor, cannot be reduced significantly.
引用
收藏
页码:291 / 330
页数:40
相关论文
共 50 条
  • [21] GENERALIZED AGREEMENT BETWEEN CONCURRENT FAIL-STOP PROCESSES
    BURNS, JE
    CRUZ, RI
    LOUI, MC
    DISTRIBUTED ALGORITHMS, 1993, 725 : 84 - 98
  • [22] An efficient fail-stop signature scheme based on factorization
    Susilo, W
    Safavi-Naini, R
    IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 62 - 74
  • [23] BYZANTINE GENERALS IN ACTION - IMPLEMENTING FAIL-STOP PROCESSORS
    SCHNEIDER, FB
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1984, 2 (02): : 145 - 154
  • [24] A proxy fail-stop signature scheme with proxy revocation
    Kim, Young-Seol
    Chang, Jik Hyun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (03): : 281 - 295
  • [25] An efficient construction for fail-stop signature for long messages
    Safavi-Naini, R
    Susilo, W
    Wang, HX
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (06) : 879 - 897
  • [26] A Short Fail-Stop Signature Scheme from Factoring
    Yamakawa, Takashi
    Kitajima, Nobuaki
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 309 - 316
  • [27] Fail-stop failure recovery in neighbor replica environment
    Noor, Ahmad Shukri Mohd
    Deris, Mustafa Mat
    4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 1040 - 1045
  • [28] A general construction for fail-stop signature using authentication codes
    Safavi-Naini, R
    Susilo, W
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 343 - 356
  • [29] An improved fail-stop signature scheme based on dual complexities
    Chang, K. H. (evenken2002@yahoo.com.tw), 1600, ICIC International (10):
  • [30] Design method, fail-stop safety model, and embedded application
    Sveda, M
    JOURNAL OF SYSTEMS ARCHITECTURE, 1997, 43 (1-5) : 47 - 57