메뉴 건너뛰기




Volumn 17, Issue 3, 2013, Pages 46-57

Server-aided signatures verification secure against collusion attack

Author keywords

Collusion attack; Delegation; Pairings; Server aided computation; Signatures; Weak computational device

Indexed keywords

COLLUSION ATTACK; COMPUTATIONAL DEVICES; DELEGATION; PAIRINGS; SERVER-AIDED COMPUTATION; SIGNATURES;

EID: 84875259808     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2012.10.007     Document Type: Conference Paper
Times cited : (17)

References (45)
  • 1
    • 84875252646 scopus 로고    scopus 로고
    • Constant-size dynamic k-times anonymous authentication
    • M.H. Au, W. Susilo, Y. Mu, and S.S.M. Chow Constant-size dynamic k-times anonymous authentication IEEE Syst J 2013
    • (2013) IEEE Syst J
    • Au, M.H.1    Susilo, W.2    Mu, Y.3    Chow, S.S.M.4
  • 3
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • K. Nyberg, Lecture Notes in Computer Science Springer
    • M. Bellare, J.A. Garay, and T. Rabin Fast batch verification for modular exponentiation and digital signatures K. Nyberg, Eurocrypt Lecture Notes in Computer Science vol. 1403 1998 Springer 236 250
    • (1998) Eurocrypt , vol.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 4
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • D. Boneh, and X. Boyen Short signatures without random oracles and the SDH assumption in bilinear groups J Cryptol 21 2 2008 149 177
    • (2008) J Cryptol , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • M.K. Franklin, Lecture Notes in Computer Science Springer
    • D. Boneh, X. Boyen, and H. Shacham Short group signatures M.K. Franklin, CRYPTO Lecture Notes in Computer Science vol. 3152 2004 Springer 41 55
    • (2004) CRYPTO , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, and M.K. Franklin Identity-based encryption from the Weil pairing SIAM J Comput 32 3 2003 586 615
    • (2003) SIAM J Comput , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 7
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • E. Biham, Lecture Notes in Computer Science Springer
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham Aggregate and verifiably encrypted signatures from bilinear maps E. Biham, Eurocrypt Lecture Notes in Computer Science vol. 2656 2003 Springer 416 432
    • (2003) Eurocrypt , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 8
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • V. Shoup, Lecture Notes in Computer Science Springer
    • D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys V. Shoup, CRYPTO Lecture Notes in Computer Science vol. 3621 2005 Springer 258 275
    • (2005) CRYPTO , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 9
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing J Cryptol 17 4 2004 297 319
    • (2004) J Cryptol , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • V. Atluri, B. Pfitzmann, P.D. McDaniel, ACM
    • D. Boneh, and H. Shacham Group signatures with verifier-local revocation V. Atluri, B. Pfitzmann, P.D. McDaniel, ACM conference on computer and communications security 2004 ACM 168 177
    • (2004) ACM Conference on Computer and Communications Security , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 11
    • 38049115330 scopus 로고    scopus 로고
    • Mesh signatures
    • M. Naor, Lecture Notes in Computer Science Springer
    • X. Boyen Mesh signatures M. Naor, EUROCRYPT Lecture Notes in Computer Science vol. 4515 2007 Springer 210 227
    • (2007) EUROCRYPT , vol.4515 , pp. 210-227
    • Boyen, X.1
  • 12
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • M. Naor, Lecture Notes in Computer Science Springer
    • J. Camenisch, S. Hohenberger, and M.Ø. Pedersen Batch verification of short signatures M. Naor, EUROCRYPT Lecture Notes in Computer Science vol. 4515 2007 Springer 246 263
    • (2007) EUROCRYPT , vol.4515 , pp. 246-263
    • Camenisch, J.1    Hohenberger, S.2    Pedersen M.Ø3
  • 13
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • M.K. Franklin, Lecture Notes in Computer Science Springer
    • J. Camenisch, and A. Lysyanskaya Signature schemes and anonymous credentials from bilinear maps M.K. Franklin, CRYPTO Lecture Notes in Computer Science vol. 3152 2004 Springer 56 72
    • (2004) CRYPTO , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from Gap Diffie-Hellman groups
    • Y. Desmedt, Lecture Notes in Computer Science Springer
    • J.C. Cha, and J.H. Cheon An identity-based signature from Gap Diffie-Hellman groups Y. Desmedt, Public key cryptography Lecture Notes in Computer Science vol. 2567 2003 Springer 18 30
    • (2003) Public Key Cryptography , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 15
    • 84948970342 scopus 로고
    • Designated confirmer signatures
    • A.D. Santis, Lecture Notes in Computer Science Springer
    • D. Chaum Designated confirmer signatures A.D. Santis, Eurocrypt Lecture Notes in Computer Science vol. 950 1994 Springer 86 91
    • (1994) Eurocrypt , vol.950 , pp. 86-91
    • Chaum, D.1
  • 16
    • 0010252194 scopus 로고
    • Undeniable signatures
    • G. Brassard, Lecture Notes in Computer Science Springer
    • D. Chaum, and H.V. Antwerpen Undeniable signatures G. Brassard, Crypto Lecture Notes in Computer Science vol. 435 1989 Springer 212 216
    • (1989) Crypto , vol.435 , pp. 212-216
    • Chaum, D.1    Antwerpen, H.V.2
  • 17
    • 78650755198 scopus 로고    scopus 로고
    • Secure delegation of elliptic-curve pairing
    • D. Gollmann, J.-L. Lanet, J. Iguchi-Cartigny, Lecture Notes in Computer Science Springer Also available at
    • B. Chevallier-Mames, J.-S. Coron, N. McCullagh, D. Naccache, and M. Scott Secure delegation of elliptic-curve pairing D. Gollmann, J.-L. Lanet, J. Iguchi-Cartigny, CARDIS Lecture Notes in Computer Science vol. 6035 2010 Springer 24 35 Also available at: http://eprint.iacr.org/2005/150
    • (2010) CARDIS , vol.6035 , pp. 24-35
    • Chevallier-Mames, B.1    Coron, J.-S.2    McCullagh, N.3    Naccache, D.4    Scott, M.5
  • 19
    • 33745818483 scopus 로고    scopus 로고
    • Security-mediated certificateless cryptography
    • M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Lecture Notes in Computer Science Springer
    • S.S.M. Chow, C. Boyd, and J.M.G. Nieto Security-mediated certificateless cryptography M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Public key cryptography Lecture Notes in Computer Science vol. 3958 2006 Springer 508 524
    • (2006) Public Key Cryptography , vol.3958 , pp. 508-524
    • Chow, S.S.M.1    Boyd, C.2    Nieto, J.M.G.3
  • 20
    • 84863238100 scopus 로고    scopus 로고
    • Dynamic secure cloud storage with provenance
    • D. Naccache, Lecture Notes in Computer Science Springer
    • S.S.M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R.H. Deng Dynamic secure cloud storage with provenance D. Naccache, Cryptography and security Lecture Notes in Computer Science vol. 6805 2012 Springer 442 464
    • (2012) Cryptography and Security , vol.6805 , pp. 442-464
    • Chow, S.S.M.1    Chu, C.-K.2    Huang, X.3    Zhou, J.4    Deng, R.H.5
  • 21
    • 79951807252 scopus 로고    scopus 로고
    • Non-interactive confirmer signatures
    • A. Kiayias, Lecture Notes in Computer Science Springer
    • S.S.M. Chow, and K. Haralambiev Non-interactive confirmer signatures A. Kiayias, CT-RSA Lecture Notes in Computer Science vol. 6558 2011 Springer 49 64
    • (2011) CT-RSA , vol.6558 , pp. 49-64
    • Chow, S.S.M.1    Haralambiev, K.2
  • 22
    • 84863469103 scopus 로고    scopus 로고
    • SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment
    • F. Bao, P. Samarati, J. Zhou, Lecture Notes in Computer Science Springer
    • S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.M. Yiu SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment F. Bao, P. Samarati, J. Zhou, ACNS Lecture Notes in Computer Science vol. 7341 2012 Springer 526 543
    • (2012) ACNS , vol.7341 , pp. 526-543
    • Chow, S.S.M.1    He, Y.J.2    Hui, L.C.K.3    Yiu, S.M.4
  • 23
    • 79956031055 scopus 로고    scopus 로고
    • Identity-based online/offline key encapsulation and encryption
    • R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ACM
    • S.S.M. Chow, J.K. Liu, and J. Zhou Identity-based online/offline key encapsulation and encryption R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ASIACCS 2011 ACM 52 60
    • (2011) ASIACCS , pp. 52-60
    • Chow, S.S.M.1    Liu, J.K.2    Zhou, J.3
  • 24
    • 52149106246 scopus 로고    scopus 로고
    • General certificateless encryption and timed-release encryption
    • R. Ostrovsky, R.D. Prisco, I. Visconti, Lecture Notes in Computer Science Springer
    • S.S.M. Chow, V. Roth, and E.G. Rieffel General certificateless encryption and timed-release encryption R. Ostrovsky, R.D. Prisco, I. Visconti, SCN Lecture Notes in Computer Science vol. 5229 2008 Springer 126 143
    • (2008) SCN , vol.5229 , pp. 126-143
    • Chow, S.S.M.1    Roth, V.2    Rieffel, E.G.3
  • 25
    • 26444540788 scopus 로고    scopus 로고
    • Efficient identity based ring signature
    • J. Ioannidis, A.D. Keromytis, M. Yung, Lecture Notes in Computer Science
    • S.S.M. Chow, S.-M. Yiu, and L.C.K. Hui Efficient identity based ring signature J. Ioannidis, A.D. Keromytis, M. Yung, ACNS Lecture Notes in Computer Science vol. 3531 2005 499 512
    • (2005) ACNS , vol.3531 , pp. 499-512
    • Chow, S.S.M.1    Yiu, S.-M.2    Hui, L.C.K.3
  • 26
    • 79956000167 scopus 로고    scopus 로고
    • Secure mobile subscription of sensor-encrypted data
    • R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ACM
    • C-K Chu, W.T. Zhu, S.S.M. Chow, J. Zhou, and R.H. Deng Secure mobile subscription of sensor-encrypted data R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ASIACCS 2011 ACM 228 237
    • (2011) ASIACCS , pp. 228-237
    • Chu, C.-K.1    Zhu, W.T.2    Chow, S.S.M.3    Zhou, J.4    Deng, R.H.5
  • 27
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size Ciphertexts and private keys
    • K. Kurosawa, Lecture Notes in Computer Science Springer
    • C. Delerablée Identity-based broadcast encryption with constant size Ciphertexts and private keys K. Kurosawa, ASIACRYPT Lecture Notes in Computer Science vol. 4833 2007 Springer 200 215
    • (2007) ASIACRYPT , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 28
    • 0033879372 scopus 로고    scopus 로고
    • Complexity and fast algorithms for multiexponentiations
    • V.S. Dimitrov, G.A. Jullien, and W.C. Miller Complexity and fast algorithms for multiexponentiations IEEE Trans Comput 49 2 2000 141 147
    • (2000) IEEE Trans Comput , vol.49 , Issue.2 , pp. 141-147
    • Dimitrov, V.S.1    Jullien, G.A.2    Miller, W.C.3
  • 29
    • 67650224819 scopus 로고    scopus 로고
    • Practical short signature batch verification
    • M. Fischlin, Lecture Notes in Computer Science Springer
    • A.L. Ferrara, M. Green, S. Hohenberger, and M.Ø. Pedersen Practical short signature batch verification M. Fischlin, CT-RSA Lecture Notes in Computer Science vol. 5473 2009 Springer 309 324
    • (2009) CT-RSA , vol.5473 , pp. 309-324
    • Ferrara, A.L.1    Green, M.2    Hohenberger, S.3    Pedersen M.Ø4
  • 30
    • 33646773954 scopus 로고    scopus 로고
    • Server-aided verification: Theory and practice
    • B.K. Roy, Lecture Notes in Computer Science Springer
    • M. Girault, and D. Lefranc Server-aided verification: theory and practice B.K. Roy, ASIACRYPT Lecture Notes in Computer Science vol. 3788 2005 Springer 605 623
    • (2005) ASIACRYPT , vol.3788 , pp. 605-623
    • Girault, M.1    Lefranc, D.2
  • 31
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM J Comput 17 2 1998 281 308
    • (1998) SIAM J Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 32
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • K. Nyberg, H.M. Heys, Lecture Notes in Computer Science Springer
    • F. Hess Efficient identity based signature schemes based on pairings K. Nyberg, H.M. Heys, Selected areas in cryptography Lecture Notes in Computer Science vol. 2595 2002 Springer 310 324
    • (2002) Selected Areas in Cryptography , vol.2595 , pp. 310-324
    • Hess, F.1
  • 34
    • 33646839305 scopus 로고    scopus 로고
    • Short undeniable signatures without random oracles: The missing link
    • S. Maitra, C.E.V. Madhavan, R. Venkatesan, Lecture Notes in Computer Science Springer
    • F. Laguillaumie, and D. Vergnaud Short undeniable signatures without random oracles: the missing link S. Maitra, C.E.V. Madhavan, R. Venkatesan, Indocrypt Lecture Notes in Computer Science vol. 3797 2005 Springer 283 296
    • (2005) Indocrypt , vol.3797 , pp. 283-296
    • Laguillaumie, F.1    Vergnaud, D.2
  • 35
    • 33746066354 scopus 로고    scopus 로고
    • Sequential aggregate signatures and multisignatures without random oracles
    • S. Vaudenay, Lecture Notes in Computer Science Springer
    • S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters Sequential aggregate signatures and multisignatures without random oracles S. Vaudenay, EUROCRYPT Lecture Notes in Computer Science vol. 4004 2006 Springer 465 485
    • (2006) EUROCRYPT , vol.4004 , pp. 465-485
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacham, H.4    Waters, B.5
  • 37
    • 72749106279 scopus 로고    scopus 로고
    • Algorithms for multi-exponentiation
    • S. Vaudenay, A.M. Youssef, Lecture Notes in Computer Science Springer
    • B. Möller Algorithms for multi-exponentiation S. Vaudenay, A.M. Youssef, Selected areas in cryptography Lecture Notes in Computer Science vol. 2259 2001 Springer 165 180
    • (2001) Selected Areas in Cryptography , vol.2259 , pp. 165-180
    • Möller, B.1
  • 38
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • R. Cramer, Lecture Notes in Computer Science Springer
    • A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, EUROCRYPT Lecture Notes in Computer Science vol. 3494 2005 Springer 457 473
    • (2005) EUROCRYPT , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 39
    • 33744928902 scopus 로고    scopus 로고
    • Enhanced aggregate signatures from pairings
    • D. Feng, D. Lin, M. Yung, Lecture Notes in Computer Science Springer
    • Z. Shao Enhanced aggregate signatures from pairings D. Feng, D. Lin, M. Yung, CISC Lecture Notes in Computer Science vol. 3822 2005 Springer 140 149
    • (2005) CISC , vol.3822 , pp. 140-149
    • Shao, Z.1
  • 40
    • 38149111147 scopus 로고    scopus 로고
    • Batch pairing delegation
    • A. Miyaji, H. Kikuchi, K. Rannenberg, Lecture Notes in Computer Science Springer
    • P.P. Tsang, S.S.M. Chow, and S.W. Smith Batch pairing delegation A. Miyaji, H. Kikuchi, K. Rannenberg, IWSEC Lecture Notes in Computer Science vol. 4752 2007 Springer 74 90
    • (2007) IWSEC , vol.4752 , pp. 74-90
    • Tsang, P.P.1    Chow, S.S.M.2    Smith, S.W.3
  • 41
    • 79952985411 scopus 로고    scopus 로고
    • Comment on Wu et al.'s server-aided verification signature schemes
    • Z. Wang, L. Wang, Y. Yang, and Z. Hu Comment on Wu et al.'s server-aided verification signature schemes Int J Netw Security 10 2 2010 158 160
    • (2010) Int J Netw Security , vol.10 , Issue.2 , pp. 158-160
    • Wang, Z.1    Wang, L.2    Yang, Y.3    Hu, Z.4
  • 42
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • R. Cramer, Lecture Notes in Computer Science Springer
    • B. Waters Efficient identity-based encryption without random oracles R. Cramer, EUROCRYPT Lecture Notes in Computer Science vol. 3494 2005 Springer 114 127
    • (2005) EUROCRYPT , vol.3494 , pp. 114-127
    • Waters, B.1
  • 43
    • 57049172488 scopus 로고    scopus 로고
    • Server-aided verification signatures: Definitions and new constructions
    • J. Baek, F. Bao, K. Chen, X. Lai, Lecture Notes in Computer Science Springer
    • W. Wu, Y. Mu, W. Susilo, and X. Huang Server-aided verification signatures: definitions and new constructions J. Baek, F. Bao, K. Chen, X. Lai, ProvSec Lecture Notes in Computer Science vol. 5324 2008 Springer 141 155
    • (2008) ProvSec , vol.5324 , pp. 141-155
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Huang, X.4
  • 44
    • 79952989011 scopus 로고    scopus 로고
    • Provably secure server-aided verification signatures
    • W. Wu, Y. Mu, W. Susilo, and X. Huang Provably secure server-aided verification signatures Comput Math Appl 61 7 2011 1705 1723
    • (2011) Comput Math Appl , vol.61 , Issue.7 , pp. 1705-1723
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Huang, X.4
  • 45
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • F. Bao, R.H. Deng, J. Zhou, Lecture Notes in Computer Science Springer
    • F. Zhang, R. Safavi-Naini, and W. Susilo An efficient signature scheme from bilinear pairings and its applications F. Bao, R.H. Deng, J. Zhou, Public key cryptography Lecture Notes in Computer Science vol. 2947 2004 Springer 277 290
    • (2004) Public Key Cryptography , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.