Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment

Identifieur interne : 003878 ( Main/Curation ); précédent : 003877; suivant : 003879

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment

Auteurs : Yuki Hara [Japon] ; Taiki Ishiwata [Japon] ; Junji Shikata [Japon] ; Tsutomu Matsumoto [Japon]

Source :

RBID : ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C

Abstract

Abstract: In this paper, as a fundamental cryptographic protocol with information-theoretic security, we propose an unconditionally secure blind authentication code (BA-code for short) which is an unconditionally secure authentication code with anonymity of messages. As we will see, the BA-code is a simple model of an authentication code with the function similar to that of the unconditionally secure blind signature (USBS for short). The relationship between BA-codes and USBS is similar to the one between traditional authentication codes and unconditionally secure signature schemes as well as the one between group authentication codes and group signature schemes. In addition, we provide two kinds of constructions of BA-codes: direct constructions based on polynomials over finite fields, and a generic construction by using unconditionally secure encryption and A2-codes. Furthermore, as application we show a link between BA-codes and commitment in unconditional security setting: starting from BA-codes, unconditionally secure commitment schemes can be constructed in a black-box way.

Url:
DOI: 10.1007/978-3-642-02002-5_7

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment</title>
<author>
<name sortKey="Hara, Yuki" sort="Hara, Yuki" uniqKey="Hara Y" first="Yuki" last="Hara">Yuki Hara</name>
</author>
<author>
<name sortKey="Ishiwata, Taiki" sort="Ishiwata, Taiki" uniqKey="Ishiwata T" first="Taiki" last="Ishiwata">Taiki Ishiwata</name>
</author>
<author>
<name sortKey="Shikata, Junji" sort="Shikata, Junji" uniqKey="Shikata J" first="Junji" last="Shikata">Junji Shikata</name>
</author>
<author>
<name sortKey="Matsumoto, Tsutomu" sort="Matsumoto, Tsutomu" uniqKey="Matsumoto T" first="Tsutomu" last="Matsumoto">Tsutomu Matsumoto</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-02002-5_7</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-V3RP2T3M-R/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002270</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002270</idno>
<idno type="wicri:Area/Istex/Curation">002239</idno>
<idno type="wicri:Area/Istex/Checkpoint">000985</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000985</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Hara Y:unconditionally:secure:blind</idno>
<idno type="wicri:Area/Main/Merge">003956</idno>
<idno type="wicri:Area/Main/Curation">003878</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment</title>
<author>
<name sortKey="Hara, Yuki" sort="Hara, Yuki" uniqKey="Hara Y" first="Yuki" last="Hara">Yuki Hara</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Ishiwata, Taiki" sort="Ishiwata, Taiki" uniqKey="Ishiwata T" first="Taiki" last="Ishiwata">Taiki Ishiwata</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Shikata, Junji" sort="Shikata, Junji" uniqKey="Shikata J" first="Junji" last="Shikata">Junji Shikata</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Japon</country>
</affiliation>
</author>
<author>
<name sortKey="Matsumoto, Tsutomu" sort="Matsumoto, Tsutomu" uniqKey="Matsumoto T" first="Tsutomu" last="Matsumoto">Tsutomu Matsumoto</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Japon</country>
<wicri:regionArea>Graduate School of Environment and Information Sciences, Yokohama National University</wicri:regionArea>
<wicri:noRegion>Yokohama National University</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Japon</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: In this paper, as a fundamental cryptographic protocol with information-theoretic security, we propose an unconditionally secure blind authentication code (BA-code for short) which is an unconditionally secure authentication code with anonymity of messages. As we will see, the BA-code is a simple model of an authentication code with the function similar to that of the unconditionally secure blind signature (USBS for short). The relationship between BA-codes and USBS is similar to the one between traditional authentication codes and unconditionally secure signature schemes as well as the one between group authentication codes and group signature schemes. In addition, we provide two kinds of constructions of BA-codes: direct constructions based on polynomials over finite fields, and a generic construction by using unconditionally secure encryption and A2-codes. Furthermore, as application we show a link between BA-codes and commitment in unconditional security setting: starting from BA-codes, unconditionally secure commitment schemes can be constructed in a black-box way.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003878 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Curation/biblio.hfd -nk 003878 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Curation
   |type=    RBID
   |clé=     ISTEX:9485DDF56EB73AF1E427DF154C6121CEFC86CA5C
   |texte=   Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022