یک طرح امضایی مستور مبتنی بر شبکه بهینه round برای خدمات ابری
ترجمه نشده

یک طرح امضایی مستور مبتنی بر شبکه بهینه round برای خدمات ابری

عنوان فارسی مقاله: رمزیابی در مورد “یک طرح امضایی مستور مبتنی بر شبکه بهینه round برای خدمات ابری”
عنوان انگلیسی مقاله: Cryptoanalysis on ‘A round-optimal lattice-based blind signature scheme for cloud services’
مجله/کنفرانس: سیستم های کامپیوتری نسل آینده - Future Generation Computer Systems
رشته های تحصیلی مرتبط: مهندسی کامپیوتر
گرایش های تحصیلی مرتبط: رایانش ابری، مهندسی نرم افزار، امنیت اطلاعات
کلمات کلیدی فارسی: امضاهای مستور، رمزیابی های مبتنی بر شبکه ، رمزیابی
کلمات کلیدی انگلیسی: Blind signatures، Lattice-based cryptosystem، Cryptoanalysis
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
نمایه: Scopus - Master Journals List - JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.future.2018.12.067
دانشگاه: Seoul National University, Seoul, Republic of Korea
صفحات مقاله انگلیسی: 4
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 7/007 در سال 2018
شاخص H_index: 93 در سال 2019
شاخص SJR: 0/835 در سال 2018
شناسه ISSN: 0167-739X
شاخص Quartile (چارک): Q1 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E11543
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Preliminaries

3- The blind signature scheme by Zhu et al.

4- Cryptoanalysis on Zhu et al. ’s blind signature scheme

5- Discussion

6- Conclusion

References

بخشی از مقاله (انگلیسی)

Abstract

In this note, we review the article published by Zhu et al. in Future Generation Computer Systems in 2017. We show that their construction of a blind signature does not hold the correctness requirement or the blindness requirement.

Discussion

In this section, we briefly describe the difficulties of building provably secure blind signatures and future work. To our best knowledge, from lattices, there is one known provably secure blind signature [3]. In [3], it is well described why building a provably secure blind signature is difficult in general and why it is more difficult when it comes to working with lattices. Here is a quick summary and we refer to [3] for details. First, building a provably secure blind signature is non-trivial in general since two security requirements of a blind signature scheme, the blindness and the one-more unforgeability have somewhat conflicting characteristics. To provide the blindness, the user is given an ability to modify the signature from the signer. However, the ability must be limited only to the single signature. Otherwise, it hurts the one-more unforgeability. Secondly, building a probably secure blind signature from lattices becomes harder because in lattices, the completeness is not naturally followed. In particular, the blind signature by Ruckert [ ¨ 3] makes use of a commitment scheme and additional interactions to overcome the incompleteness. Moreover, in lattices, RSA-style design does not work [3]: the RSA-style using preimage trapdoor functions consists of the following procedures, (1) hash, (2) blind, (3) invert, then (4) unblind. In lattice, such a style does not work due to the linearity of the function (For details, we refer to [3]). As summarized in the above, building a blind signature that is provably secure in lattices requires a careful design and rigorous security analysis. Often plausible designs fail to be provably secure [1,5,6]. Since the problem becomes harder in lattices, a rigorous study is required. One possible approach is improving the scheme by Ruckert [ ¨ 3] by lessening the number of interactions. One might try to lessen them by sending two or more commitments at a time. Another possible approach is building a lattice-based witness indistinguishability primitive first and then applying it as a building block like in [5,6]. The aforementioned methods require further research to ensure provable security analysis and concrete scheme design. In this paper, we focus on providing cryptoanalysis of the particular scheme. We will continue the further research as a future work.