signature=c153bdd5e4530efd48913e5536da70ac,Set signatures and their applications

本文提出了一种新的数字签名方法——集合签名,它允许在给定签名算法的情况下,仅能对属于预定义集合的消息创建有效签名。这种特殊性质使得签名算法可以公开,挑战传统私钥签名的保密性。研究了集合签名在智能移动代理中验证“小于”条件的应用,展示了其在小规模集合上的适用性。主要引用了相关加密理论和协议作为背景。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Abstract

There are many constraints in the use of digital signatures. This paper proposes a new way of using digital signatures with some restrictions, i.e. set signatures. It works in such a way that when the signing algorithm is given, one can use it to create a valid signature on a message if and only if the message belongs to a pre-defined set, and given the information about the signing algorithm, it is computationally infeasible to create valid signatures on any other arbitrary messages outside of the set. This special property enables the signing algorithm to be made public, which seems to contradict with the traditional signature where a private key is needed, which must be kept secret. What makes the problem challenging is that the signing algorithm does not reveal the secret signing key, and hence forging normal signatures for arbitrary messages is computationally infeasible. In many cases, the signing algorithm does not reveal the elements in the authorized set. As an application of the new concept, set signatures for intelligent mobile agents committing “smaller than” condition is studied, which shows the applicability of set signatures on small sets.

This is a preview of subscription content, access via your institution.

Access options

Buy single article

Instant access to the full article PDF.

34,95 €

Tax calculation will be finalised during checkout.

References

1

Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22: 644–654

2

Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 1978, 21(2): 120–126

3

Chaum D. Designated confirmer signatures. In: Proceedings of EUROCRYPT’94. Berlin: Springer-Verlag, 1995

4

Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Proceedings of CRYPTO’94, LNCS 839. Berlin: Springer-Verlag, 1994. 61–74

5

Zhang K. Threshold proxy signature schemes. In: Proceedings of the 1st International Information Security Workshop (ISW’97), LNCS 1396. Berlin: Springer-Verlag 1997. 282–290

6

Li C M, Hwang T, Lee N Y. Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Proceedings of EUROCRYPT’94. Berlin: Springer-Verlag, 1995. 194–204

7

Camenisch J, Stadler M. Efficient group signature schemes for large groups. In: Proceedings of CRYPTO’97. Berlin: Springer-Verlag, 1997. 410–424

8

Chaum D. Blind signature system. In: Proceedings of CRYPTO’83. New York: Plenum Press, 1984. 153

9

National Institute for Standards and Technology. Digital Signature Standard (DSS). Federal Register, 1991, 56(169)

10

Mao W. Modern Cryptography: Theory and Practice (in Chinese). Beijing: Publishing House of Electronics Industry, 2004

11

Yao A C. Protocols for secure computations. In: Proceedings of 23rd Annual Symposium on Foundations of Computer Science (FOCS’82). Washington DC: IEEE Computer Society, 1982. 160–164

12

Lin H, Tzeng W. An efficient solution to the millionaires’ problem based on homomorphic encryption. In: Proceedings of Applied Cryptography and Network Security Conference (ACNS’05), LNCS 3531. Berlin: Springer-Verlag, 2005. 456–466Author information

AffiliationsState Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, China

ChuanKun Wu

AuthorsChuanKun Wu

Corresponding author

Correspondence to

ChuanKun Wu.Additional information

Supported in part by the National Basic Research Program of China (Grant No. 2007CB807902), and the National High-Tech Research & Development Program of China (Grant No. 2006AA01Z423)About this article

Cite this article

Wu, C. Set signatures and their applications.

Sci. China Ser. F-Inf. Sci. 52,1346–1357 (2009). https://doi.org/10.1007/s11432-009-0150-5Received:07 April 2008

Accepted:10 October 2008

Published:08 August 2009

Issue Date:August 2009

Keywordscryptography

set signature

forward security

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值