Transitive Signatures Based on Factoring and RSA
نویسندگان
چکیده
We present novel realizations of the transitive signature primitive introduced by Micali andRivest [11]. Our first scheme, FBTS-1, is proven transitively unforgeable under adaptive chosen-message attack assuming factoring is hard. We then present a hash-based modification, FBTS-2achieving shorter signatures by eliminating the need for “node certificates”, and provable underthe same factoring assumption in the random oracle model. We also provide an answer to anopen question raised in [11] regarding the security of their RSA based scheme, by showing that itis transitively unforgeable under adaptive chosen-message attack assuming the security of RSAunder one-more-inversion. Finally we present a similar hash-based modification of this schemethat results in a performance improvement.
منابع مشابه
Transitive Signatures Based on Bilinear Maps
The notion of transitive signature, firstly introduced by Micali and Rivest, is a way to digitally sign the vertices and edges of a dynamically growing, transitively closed graph. All the previous proposed transitive signature schemes were constructed from discrete logarithm, factoring, or RSA assumption. In this paper, we introduce two alternative realizations of transitive signature based on ...
متن کاملA New Transitive Signature Scheme based on RSA-based Security Assumptions
A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability which means that by knowing signatures on two edges ...
متن کاملTransitive Signatures Based on Non-adaptive Standard Signatures
Transitive signature, motivated by signing vertices and edges of a dynamically growing, transitively closed graph, was first proposed by Micali and Rivest. The general designing paradigm proposed there involved a underlying standard signature scheme, which is required to be existentially unforgeable against adaptive chosen message attacks. We show that the requirement for the underlying signatu...
متن کاملA New Provably Secure Transitive Signature Scheme
A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability. Composability means that by knowing signatures on t...
متن کاملThe Representation Problem Based on Factoring
We review the representation problem based on factoring and show that this problem gives rise to alternative solutions to a lot of cryptographic protocols in the literature. And, while the solutions so far usually either rely on the RSA problem or the intractability of factoring integers of a special form (e.g., Blum integers), the solutions here work with the most general factoring assumption....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002