Universally composable anonymous Hash certification model

来源 :Science in China(Series F:Information Sciences) | 被引量 : 0次 | 上传用户:sven321
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be using combinations of a secure digital signature scheme, a family of pseudorandom functions, and a family of one- way collision-free hash functions. Considering the limitation of wir eless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
其他文献
临沂市中小学生生长发育调查报告王汝娟,沈春忠,魏秀梅,王永彬,宋庆伟,魏学娟(临沂市卫生防疫站)(莒南县路镇医院)(蒙阴县煤矿实业总公司职工医院)关键词生长发育;学生;调查报告为了解临沂
以时光见证发展,用拼搏再创辉煌,走过“十三五”,甘肃建投七建公司再次创下非凡的成绩.rn五年来,甘肃建投七建公司面对市场下行的困难与挑战,迎难而上,紧紧围绕企业发展中心,
期刊
红专路,郑州闹市区。一条幽静的小巷,折进去,有老而不旧的小楼数排,何家安的家就在最深处。推开一楼外小院的门,一股清新的泥土味,世外桃源般的居处,不由让人联想起那句古话
  “十一五”我国钢铁行业SO2排放总量却不降反增,钢铁烧结烟气脱硫也势必成为我国“十二五”SO2减排工作的关键。目前,钢铁烧结机采用的脱硫工艺主要有湿法和干法两类。与湿
会议
  本文介绍烧结机烟气石灰石-石膏法脱硫过程中关键设备的选型,通过对整个工艺的分析,对关键设备提出切实可靠的选择要求。
他是青岛港第一代桥吊司机,出色地掌握了桥吊维修技术,自主改造了康明斯发动机等设备,1990年被提拔为第一批技师。2001年他大胆改变桥吊生产厂家的既定方案,成功主持国内最大
构建国内大循环为主体、国内国际双循环相互促进的新发展格局,对我国新时期的金融改革开放提出了新要求,建立在岸的离岸金融市场可为我国金融改革开放提供重要的窗口与试验平
应数字化课堂时代的要求,师范生的技术素养越来越受到学界和高校的重视,TPACK(整合技术的学科教学知识)包含技术知识、教学法知识和学科内容知识三者,能将技术有机整合到具体
目的:了解安徽省8所高校大学生手机依赖现状并分析其影响因素,为进一步研究和制定群体干预措施提供科学依据.方法:通过自编《当代大学生手机依赖现况调查问卷》,运用分层整群
下岗女工500元起家成了千万富婆今年63岁的谌雪花,原是湖南省安化县煤炭公司的一名女工。上个世纪90年代初,因公司经营陷入困境,谌雪花被迫下岗。 Laid-off women workers s