The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
이 문서에서 우리는 자신의 권한을 다른 사람에게 위임할 수 있는 다른 사람에게 문서를 인증하거나 서명하는 권한을 위임하는 방법에 대해 논의합니다. 실용적인 암호화 솔루션은 자신의 서명으로 구성된 인증서를 발급하는 것입니다. 최종 검증자 검사에서는 이러한 인증서의 체인을 확인합니다. 이 문서는 이러한 위임 체인에 적합한 효율적이고 입증된 보안 방식을 제공합니다. 우리는 무작위 오라클 모델에서 적응형 선택 메시지 공격에 대한 우리 계획의 보안을 증명합니다. 주요 응용 프로그램은 일부 에이전트가 사용자를 대신하여 작업하는 에이전트 시스템이지만 일부 다른 응용 프로그램 및 변형도 논의됩니다. 변종 중 하나는 자신의 권한을 그룹에 위임하여 그룹이 권한을 남용할 기회를 줄이는 임계값 기능을 사용합니다. 또 다른 애플리케이션은 기존 인증서 기반 공개 키 인프라에서 제공하는 것보다 더 빠른 확인 기능과 더 적은 통신 복잡성을 제공하는 ID 기반 서명 체계입니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Masayuki ABE, Tatsuaki OKAMOTO, "Delegation Chains Secure up to Constant Length" in IEICE TRANSACTIONS on Fundamentals,
vol. E85-A, no. 1, pp. 110-116, January 2002, doi: .
Abstract: In this paper we discuss how one can delegate his power to authenticate or sign documents to others who, again, can delegate the power to someone else. A practical cryptographic solution would be to issue a certificate that consists of one's signature. The final verifier checks verifies the chain of these certificates. This paper provides an efficient and provably secure scheme that is suitable for such a delegation chain. We prove the security of our scheme against an adaptive chosen message attack in the random oracle model. Though our primary application would be agent systems where some agents work on behalf of a user, some other applications and variants will be discussed as well. One of the variants enjoys a threshold feature whereby one can delegate his power to a group so that they have less chance to abuse their power. Another application is an identity-based signature scheme that provides faster verification capability and less communication complexity compared to those provided by existing certificate-based public key infrastructure.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e85-a_1_110/_p
부
@ARTICLE{e85-a_1_110,
author={Masayuki ABE, Tatsuaki OKAMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Delegation Chains Secure up to Constant Length},
year={2002},
volume={E85-A},
number={1},
pages={110-116},
abstract={In this paper we discuss how one can delegate his power to authenticate or sign documents to others who, again, can delegate the power to someone else. A practical cryptographic solution would be to issue a certificate that consists of one's signature. The final verifier checks verifies the chain of these certificates. This paper provides an efficient and provably secure scheme that is suitable for such a delegation chain. We prove the security of our scheme against an adaptive chosen message attack in the random oracle model. Though our primary application would be agent systems where some agents work on behalf of a user, some other applications and variants will be discussed as well. One of the variants enjoys a threshold feature whereby one can delegate his power to a group so that they have less chance to abuse their power. Another application is an identity-based signature scheme that provides faster verification capability and less communication complexity compared to those provided by existing certificate-based public key infrastructure.},
keywords={},
doi={},
ISSN={},
month={January},}
부
TY - JOUR
TI - Delegation Chains Secure up to Constant Length
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 110
EP - 116
AU - Masayuki ABE
AU - Tatsuaki OKAMOTO
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E85-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2002
AB - In this paper we discuss how one can delegate his power to authenticate or sign documents to others who, again, can delegate the power to someone else. A practical cryptographic solution would be to issue a certificate that consists of one's signature. The final verifier checks verifies the chain of these certificates. This paper provides an efficient and provably secure scheme that is suitable for such a delegation chain. We prove the security of our scheme against an adaptive chosen message attack in the random oracle model. Though our primary application would be agent systems where some agents work on behalf of a user, some other applications and variants will be discussed as well. One of the variants enjoys a threshold feature whereby one can delegate his power to a group so that they have less chance to abuse their power. Another application is an identity-based signature scheme that provides faster verification capability and less communication complexity compared to those provided by existing certificate-based public key infrastructure.
ER -