A new approach for UC security concurrent deniable authentication

来源 :Science in China(Series F:Information Sciences) | 被引量 : 0次 | 上传用户:huangcong8888
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such au- thentication ever took place. When we consider an asynchronous multi-party net- work with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally compos- able (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is pre- served under concurrent composition of an unbounded number of protocol execu- tions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and se-curity reductions. Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver can not convince a third party that such au- thentication ever took place. When we consider an asynchronous multi-party net work with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is pre- served under concurrent composition of an unbounded number of protocol execu- tions; it implies non-malleability w The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residue (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and se -curity reductions.
其他文献
编委名单刘晓军河北省馆陶县人民政府县长曹振国中共河北省鹿泉市市委书记徐兰军河北省巨鹿县人民政府县长毕建华河北省滦平县人民政府县长陈志乃河北省围场满族蒙古族自治县
介绍灵敏装甲的基本概念、抗弹机理和自行修复机理,研制灵敏装甲应解决的关键技术及目前的进展。 Introduce the basic concept of sensitive armor, anti-bombs mechanism
所谓职业素质,是劳动者对社会职业了解与适应能力的一种综合体现,主要表现在职业兴趣、职业能力、职业个性及职业情况等方面。而影响和制约职业素质的因素很多,主要包括受教
易于隐藏的手枪是人们自卫防身的首选武器。不过,何谓易于隐藏,10个人会有10种理解。如果以小于制式军用手枪来界定的话,则美国北美军械公司的NAA微型转轮手枪堪称为其中最
小学数学解决问题,就是运用“数学化”的思维习惯去描述、分析、解决问题。教师在具体的教学中,应收集并提供一些源于实际的学科知识素材,创设一定的问题的情境,引导学生能以
Currently available prognostic tools are inadequate to discern the molecular basis of the heterogenic response in hepatitis C virus (HCV) infected patients trea
南陵县位于安徽省东南部,地处九华山余脉向沿江平原过渡地带,是全国“四大米市”芜湖米市粮源重要供给县,是农业部首批认定的国家现代农业示范区、新型职业农民培育试点县。近年来,在农业部、省农委的大力指导和帮助下,南陵县高度重视新型职业农民培育工作,加强领导,突出重点,积极创新,强化扶持,培育工作形成良好共识和氛围,取得了初步成效。2013年全县有1052人申报新型职业农民,第一批认定385名,其中水稻种
习近平指出,今年是中国人民抗日战争暨世界反法西斯战争胜利70周年。安排这次学习,目的是回顾中国人民抗日战争的伟大进程,肯定中国人民抗日战争为世界反法西斯战争胜利作出
董卿在《朗读者》中说:“世间一切,都是遇见。就像,冷遇见暖,就有了雨;春遇见冬,有了岁月;天遇见地,有了永恒;人遇见人,有了生命……”我遇见《爱满教育》,心灵便有了春天。
读者:2013年全国质量专业资格考试多少分合格?兵团什么时候公布和发证书?编辑部:2013年全国质量专业资格考试合格标准初级为90分(满分150),中级102分(满分170分),兵团不再设