Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Identifieur interne : 003878 ( Main/Curation ); précédent : 003877; suivant : 003879Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Auteurs : Yuki Hara [Japon] ; Taiki Ishiwata [Japon] ; Junji Shikata [Japon] ; Tsutomu Matsumoto [Japon]Source :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: In this paper, as a fundamental cryptographic protocol with information-theoretic security, we propose an unconditionally secure blind authentication code (BA-code for short) which is an unconditionally secure authentication code with anonymity of messages. As we will see, the BA-code is a simple model of an authentication code with the function similar to that of the unconditionally secure blind signature (USBS for short). The relationship between BA-codes and USBS is similar to the one between traditional authentication codes and unconditionally secure signature schemes as well as the one between group authentication codes and group signature schemes. In addition, we provide two kinds of constructions of BA-codes: direct constructions based on polynomials over finite fields, and a generic construction by using unconditionally secure encryption and A2-codes. Furthermore, as application we show a link between BA-codes and commitment in unconditional security setting: starting from BA-codes, unconditionally secure commitment schemes can be constructed in a black-box way.
Url:
DOI: 10.1007/978-3-642-02002-5_7
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: Pour aller vers cette notice dans l'étape Curation :002270
- to stream Istex, to step Curation: Pour aller vers cette notice dans l'étape Curation :002239
- to stream Istex, to step Checkpoint: Pour aller vers cette notice dans l'étape Curation :000985
- to stream Main, to step Merge: Pour aller vers cette notice dans l'étape Curation :003956
Links to Exploration step
ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5CLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment</title>
<author><name sortKey="Hara, Yuki" sort="Hara, Yuki" uniqKey="Hara Y" first="Yuki" last="Hara">Yuki Hara</name>
</author>
<author><name sortKey="Ishiwata, Taiki" sort="Ishiwata, Taiki" uniqKey="Ishiwata T" first="Taiki" last="Ishiwata">Taiki Ishiwata</name>
</author>
<author><name sortKey="Shikata, Junji" sort="Shikata, Junji" uniqKey="Shikata J" first="Junji" last="Shikata">Junji Shikata</name>
</author>
<author><name sortKey="Matsumoto, Tsutomu" sort="Matsumoto, Tsutomu" uniqKey="Matsumoto T" first="Tsutomu" last="Matsumoto">Tsutomu Matsumoto</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-02002-5_7</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-V3RP2T3M-R/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002270</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002270</idno>
<idno type="wicri:Area/Istex/Curation">002239</idno>
<idno type="wicri:Area/Istex/Checkpoint">000985</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000985</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Hara Y:unconditionally:secure:blind</idno>
<idno type="wicri:Area/Main/Merge">003956</idno>
<idno type="wicri:Area/Main/Curation">003878</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment</title>
<author><name sortKey="Hara, Yuki" sort="Hara, Yuki" uniqKey="Hara Y" first="Yuki" last="Hara">Yuki Hara</name>
<affiliation wicri:level="1"><country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Ishiwata, Taiki" sort="Ishiwata, Taiki" uniqKey="Ishiwata T" first="Taiki" last="Ishiwata">Taiki Ishiwata</name>
<affiliation wicri:level="1"><country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Shikata, Junji" sort="Shikata, Junji" uniqKey="Shikata J" first="Junji" last="Shikata">Junji Shikata</name>
<affiliation wicri:level="1"><country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Japon</country>
</affiliation>
</author>
<author><name sortKey="Matsumoto, Tsutomu" sort="Matsumoto, Tsutomu" uniqKey="Matsumoto T" first="Tsutomu" last="Matsumoto">Tsutomu Matsumoto</name>
<affiliation wicri:level="1"><country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Japon</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: In this paper, as a fundamental cryptographic protocol with information-theoretic security, we propose an unconditionally secure blind authentication code (BA-code for short) which is an unconditionally secure authentication code with anonymity of messages. As we will see, the BA-code is a simple model of an authentication code with the function similar to that of the unconditionally secure blind signature (USBS for short). The relationship between BA-codes and USBS is similar to the one between traditional authentication codes and unconditionally secure signature schemes as well as the one between group authentication codes and group signature schemes. In addition, we provide two kinds of constructions of BA-codes: direct constructions based on polynomials over finite fields, and a generic construction by using unconditionally secure encryption and A2-codes. Furthermore, as application we show a link between BA-codes and commitment in unconditional security setting: starting from BA-codes, unconditionally secure commitment schemes can be constructed in a black-box way.</div>
</front>
</TEI>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003878 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Curation/biblio.hfd -nk 003878 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Curation |type= RBID |clé= ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C |texte= Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment }}
![]() | This area was generated with Dilib version V0.6.33. | ![]() |