Information Technology Reference
In-Depth Information
SIGK : Calling this signing key oracle enables the adversary to obtain the DAA
signing key of signer ID . The signer remains honest.
SK : The adversary can call this signer secret key oracle to obtain the signer secret
keys of signer
ID
HS
, and then the oracle moves ID from HS to CS.
Sig : The signing oracle, enabling the adversary to specify the identity ID of a
signer, a message m and a basename bsn , and obtain the DAA signature of m under
the signing key sigk ID of ID , as long as ID is an honest signer whose DAA signing key
is defined.
Ch : The adversary sends a pair of honest identities ( ID 0 , ID 1 ), a message m and a
basename bsn to the challenge oracle and gets back a DAA signature ˃ by the signer
ID b ,
b
R {0,1}.
Correctness. The DAA signatures generated by honest signers are accepted by verifi-
ers. In addition, two DAA signatures generated by the same signer with the same
basename
can
be
linked.
To
formalize
this,
we
define
corr
corr
Adv
(
κ
)
=
Pr[Game
(
κ
)
=
1]
and we say that the DAA scheme is correct if
corr
κ ∈
. The game Game
corr
Adv
(
κ
)
=
0
for all adversaries and
(
κ
)
is defined as
below:
Attack-Game Game
corr
(
κ
) :
κ
(,
ipk isk
) t 1 ; HS
φ
; (,
ID m
,
m
,
bsn
)

( :
ipk
;
0
1
AddS
If
i
HS then return 0; If
sigk
=
then return 0.
ID
σ
σ
Sign(
:(
ipk sigk
,
,
m
,
n
,
bsn
),
:(
sk
,
ipk
));
0
ID
0
ID
Sign(
: (
ipk sigk
,
,
m
,
n
,
bsn
),
: (
sk
,
ipk
));
1
ID
1
ID
If
Verify(
ipk m
,
,
bsn
, RL,
σ
σ
σσ
)=0 then return 1.
0
0
If Verify(
ipk m
,
,
bsn
, RL,
)=0 then return 1.
1
1
If
bsn
≠⊥
Link(
ipk
,
,
m
,
,
m
,
bsn
)=0 then return 1.
0011
Return 0.
User-Controlled Anonymity. The definition of user-controlled anonymity requires
two security properties in the DAA scheme. The first one is anonymity that no adver-
sary can reveal the identity of the signer from its signature without the signer's secret
key sk . The second property is user-controlled unlinkability that given two signatures
0
σ associated with two different basenames, it is infeasible for an adversary to
distinguish whether or not the two signatures are generated by the same signer. We
define Adv
σ
and
1
anon
anon
b
(
κ
)
=
| Pr[Game
(
κ
)
=
1]
1 / 2 |
and say that the DAA scheme has
anon
user-controlled anonymity if Adv
(
κ
)
is negligible in κ
for any polynomial-time
adversary . The game Game
anon
b
(
κ
)
is defined as below:
anon
b
Attack-Game Game
(
κ
) :
//
b
R {0,1}
k
(,
ipk isk
) t 1 ;CS
φ
;HS
φ
;
b
(,
ipk isk
:
,
   
,
,
,
;
SndToS
SigK
SK
Sig
Ch
=
If
bb
then return 1 else return 0.
Search WWH ::




Custom Search