• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
Citation: Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422

Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions

More Information
  • Published Date: September 30, 2017
  • Provable security has become one basic requirement for constructing and analyzing cryptographic schemes. This paper studies the classical issue in the field of provable security, namely how to construct provably secure digital signature schemes with tight security reduction from certain basic mathematical hard problems in the random oracle model. This paper first proposes a new cryptographic primitive called a strong chameleon Hash function. Based on a strong chameleon Hash function, we present a generic framework and its variant respectively for constructing a stateful and stateless digital signature scheme with tight security. We prove that these generic digital signature schemes are both secure under the assumption that the underlying chameleon Hash function is collision resistant in the random oracle model. By applying these generic construction methods to some concrete chameleon Hash functions under common mathematical assumptions such as RSA, CDH and IF (integer factorization), the corresponding digital signature schemes with tight security can be modularly obtained. The two existing classic paradigms to generically construct tightly secure signature schemes, i.e. Fiat-Shamir signatures and Full-Domain-Hash signatures, can be roughly unified by our generic frameworks. Furthermore, under our generic frameworks, a tightly secure signature scheme following the Fiat-Shamir methodology can be seen as the optimized variant of the corresponding tightly secure signature scheme following the Full-Domain-Hash framework.
  • Related Articles

    [1]Zeng Biqing, Zeng Feng, Han Xuli, Shang Qi. Aspect Extraction Model Based on Interactive Feature Representation[J]. Journal of Computer Research and Development, 2021, 58(1): 224-232. DOI: 10.7544/issn1000-1239.2021.20190305
    [2]Wang Xin, Wang Ying, Zuo Wanli. Exploring Interactional Opinions and Status Theory for Predicting Links in Signed Network[J]. Journal of Computer Research and Development, 2016, 53(4): 764-775. DOI: 10.7544/issn1000-1239.2016.20151079
    [3]Zhu Jun, Guo Changguo, Wu Quanyuan. A Web Services Interaction Behavior-Environment Model Based on Generalized Stochastic Petri Nets[J]. Journal of Computer Research and Development, 2012, 49(11): 2450-2463.
    [4]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [5]Zhu Yingjie, Li Chunpeng, Ma Wanli, Xia Shihong, Zhang Tielin, Wang Zhaoqi. Interaction Feature Modeling of Virtual Object in Immersive Virtual Assembly[J]. Journal of Computer Research and Development, 2011, 48(7): 1298-1306.
    [6]Lu Difei, Ren Wenhua, Li Guojun, and Si Jin. Example Based 3D Animation Creating Interactively[J]. Journal of Computer Research and Development, 2010, 47(1): 62-71.
    [7]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [8]Wu Lingda, Gao Yu, and Wei Yingmei. A Survey of Interactive Rendering of Large-Scale and Complex Scenes[J]. Journal of Computer Research and Development, 2007, 44(9): 1579-1587.
    [9]Wang Xiaochun, Tian Feng, Qin Yanyan, and Dai Guozhong. UPIM: A User-Centered Pen-Based Interactive System[J]. Journal of Computer Research and Development, 2006, 43(8): 1337-1344.
    [10]Liu Wei, ChunTung Chou, Cheng Wenqing, Du Xu. Proxy Caching for Interactive Streaming Media[J]. Journal of Computer Research and Development, 2006, 43(4): 594-600.

Catalog

    Article views (1438) PDF downloads (637) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return