期刊文献+

Universally composable anonymous Hash certification model 被引量:9

Universally composable anonymous Hash certification model
原文传递
导出
摘要 Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives. Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
出处 《Science in China(Series F)》 2007年第3期440-455,共16页 中国科学(F辑英文版)
基金 the National Natural Science Foundation of China (Grant Nos. 90204012, 60573035, and 60573036) the MIC of Korea,under the ITRC support program supervised by the IITA (IITA-2006-C1090-0603-0026)
关键词 ANONYMOUS AUTHENTICATION HASH universal composable security anonymous, authentication, Hash, universal composable security
作者简介 Corresponding author (email: fzhang@smu.edu.sg)
  • 相关文献

参考文献1

二级参考文献22

  • 1Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35~52
  • 2Schneier B.. Applied Cryptography(2nd Edition). New York: John Wileysons, 1996
  • 3Rubin A.D.. Nonmonotonic cryptographic protocols[Ph.D. dissertation]. University of Michigan, Ann Arbor, 1994
  • 4Halpern J.Y., Fagin R.. Modelling knowledge and action in distributed systems. Distributed Computing,1989,3(4):159~179
  • 5Woo T.Y.C., Lam S.S.. A semantic model for authentication protocols. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 178~194
  • 6Marrero W., Clarke E., Jha S.. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487
  • 7Stoller S.D.. A bound on attacks on payment protocols. In: Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science(LICS), Boston, Massachusetts, 2001, 61~70
  • 8Paulson L.. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1): 85~128
  • 9Hopper N.J., Seshia S.A., Wing J.M.. Combining theory generation and model checking for security protocol analysis. Technical Report: CMU-CS-00-107, 2000
  • 10Kindred D.. Theory generation for security protocols[Ph.D. dissertation]. Carnegie Mellon University, 1999

共引文献22

同被引文献47

  • 1冯涛,马建峰.基于证人不可区分的通用可复合安全并行可否认认证[J].软件学报,2007,18(11):2871-2881. 被引量:5
  • 2Trusted Computing Group.TNC Architecture for Interoperability.Specification Version 1.4,Revision 4. . 2009
  • 3Datta A,Franklin J,Garg D,et al.A logic of secure systems and its application to trusted computing. IEEE Symp Secur Priv (S&P) . 2009
  • 4Canetti R.Universally composable security:A new paradigm for cryptographic protocols. http://eprint.iacr.org/2000/067 . 2005
  • 5Trusted Computing Group.Subject key attestation evidence extension.Specification version 1,revision 7. . 2005
  • 6Trusted Computing Group.TNC IF-T:Protocol Bindings for Tunneled EAP Methods.Specification version 1.1, revision 10. . 2007
  • 7Trusted Computing Group.TNC IF-T:Binding to TLS Specification.Version 1.0,revision 16. . 2009
  • 8Trusted Computing Group.TPM Specifications v1.2. . 2006
  • 9Institute for Electrical and Electronics Engineers (IEEE).IEEE802,Port-Based Network Access Control. IEEE Std 802.1X-2004 . 2004
  • 10Canetti R.Universally composable signatures,certification,and authenticated communication. Proceedings of 17th Computer Security Foundations Workshop . 2004

引证文献9

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部