Provably Secure Untraceable Electronic Cash against Insider Attacks(<Special Section>Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
Although a great deal of research has been done on electronic cash schemes with blind multisignatures to prevent an insider attack, there is no discussion of a formal security model in the literature. Firstly we discussed the security model of e-cash schemes based on the blind multisignature scheme against a (restricted) attack model and proposed a concrete scheme proven to be secure in the model [1]; however, this attack model disallows an attacker from corrupting an issuing bank and shops in the forgery game. In this paper, first, we reconsider the security model to remove the restriction of the attack model. Second, we propose a new untraceable e-cash scheme with a blind multisignature scheme and prove that the proposed scheme is secure against the (non-restricted) attacks under the DDH assumption in the random oracle model.
- 社団法人電子情報通信学会の論文
- 2007-05-01
著者
-
KUNIHIRO Noboru
The University of Tokyo
-
KOMANO Yuichi
Toshiba Corporation
-
OHTA Kazuo
The University of Electro-Communications
-
Kunihiro Noboru
The University Of Electro-communications
-
HANATANI Yoshikazu
TOSHIBA Corporation
-
Komano Yuichi
Toshiba Corp. Kawasaki‐shi Jpn
関連論文
- New Conditions for Secure Knapsack Schemes against Lattice Attack
- BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Small Secret CRT-Exponent Attacks on Takagis RSA
- New Conditions for Secure Knapsack Schemes against Lattice Attack
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Universally Composable Client-to-Client General Authenticated Key Exchange
- Small Secret Key Attack on a Takagi's Variant of RSA
- Provably Secure Untraceable Electronic Cash against Insider Attacks(Discrete Mathematics and Its Applications)
- Fair Exchange of Signatures with Multiple Signers(Discrete Mathematics and Its Applications)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- BS-CPA : Built-In Determined Sub-Key Correlation Power Analysis
- Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- A-7-2 Revisiting Zero-Knowledgeness of an On the Fly Authentication Scheme
- On the Hardness of Subset Sum Problem from Different Intervals
- Ring Signatures: Universally Composable Definitions and Constructions
- A New Type of Fault-Based Attack : Fault Behavior Analysis