Fail-stop signatures

被引:35
|
作者
Pedersen, TP
Pfitzmann, B
机构
[1] UNIV HILDESHEIM, INST INFORMAT, D-31141 HILDESHEIM, GERMANY
[2] AARHUS UNIV, DEPT COMP SCI, DK-8000 AARHUS, DENMARK
关键词
cryptography; authentication; digital signatures; fail-stop; discrete logarithm; factorization; randomization; computational security; information-theoretic security;
D O I
10.1137/S009753979324557X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fail-stop signatures can briefly be characterized as digital signatures that allow the signer to prove that a given forged signature is indeed a forgery. After such a proof has been published, the system can be stopped. This type of security is strictly stronger than that achievable with ordinary digital signatures as introduced by Diffie and Hellman in 1976 and formally defined by Goldwasser, Micali, and Rivest in 1988, which was widely regarded as the strongest possible definition. This paper formally defines fail-stop signatures and shows their relation to ordinary digital signatures. A general construction and actual schemes derived from it follow. They are efficient enough to be used in practice. Next, we prove lower bounds on the efficiency of any fail-stop signature scheme. In particular, we show that the number of secret random bits needed by the signer, the only parameter where the complexity of all our constructions deviates from ordinary digital signatures by more than a small constant factor, cannot be reduced significantly.
引用
收藏
页码:291 / 330
页数:40
相关论文
共 50 条
  • [31] Algorithm-Based Fault Tolerance for Fail-Stop Failures
    Chen, Zizhong
    Dongarra, Jack
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (12) : 1628 - 1641
  • [32] AN IMPROVED FAIL-STOP SIGNATURE SCHEME BASED ON DUAL COMPLEXITIES
    Chain, Kai
    Chen, Jonathan Jen-Rong
    Yang, Jar-Ferr
    Chang, Kuei Hu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2014, 10 (02): : 535 - 544
  • [33] On Fail-Stop Signature Schemes with H-EUC Security
    Nomura, Masahiro
    Nakamura, Katsuhiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 125 - 147
  • [34] Fail-Stop Designated Recipient Signature Scheme and its Applications
    Ismail, Eddie Shahril
    Abu Hasan, Yahya
    MATEMATIKA, 2007, 23 (01) : 9 - 21
  • [35] Fail-stop threshold signature schemes based on elliptic curves
    Susilo, W
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 103 - 116
  • [36] Optimal resilience patterns to cope with fail-stop and silent errors
    Benoit, Anne
    Cavelan, Aurelien
    Robert, Yves
    Sun, Hongyang
    2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, : 202 - 211
  • [37] Peacenik: Architecture Support for Not Failing under Fail-Stop Memory Consistency
    Zhang, Rui
    Biswas, Swarnendu
    Balaji, Vignesh
    Bond, Michael D.
    Lucia, Brandon
    TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, : 317 - 333
  • [38] Comment Fail-Stop Blind Signature Scheme Design Based on Pairings
    HU Xiaoming
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1545 - 1548
  • [39] Coping with silent and fail-stop errors at scale by combining replication and checkpointing
    Benoit, Anne
    Cavelan, Aurelien
    Cappello, Franck
    Raghavan, Padma
    Robert, Yves
    Sun, Hongyang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 209 - 225
  • [40] Threshold fail-stop signature schemes based on discrete logarithm and factorization
    Safavi-Naini, R
    Susilo, W
    INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 292 - 307