Universally composable anonymous Hash certification model

  • Zhang Fan Email author
  • Ma JianFeng 
  • SangJae Moon


Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.


anonymous authentication Hash universal composable security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Martin A, Phillip R. Reconciling two views of cryptography. J Crypt, 2002, 15(2): 103–127zbMATHGoogle Scholar
  2. 2.
    Wenbo M, Modern Cryptography: Theory and Practice. Prentice-Hall, PTR, 2004Google Scholar
  3. 3.
    Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security. New York: ACM Press, 1993, 62–73CrossRefGoogle Scholar
  4. 4.
    Beaver D. Foundations of secure interactive computing. In: J Feigenbaum, ed. Advances in Cryptology-Crypto’91. LNCS 576. Berlin: Springer-Verlag Press. 1991, 377–391Google Scholar
  5. 5.
    Andrew C, Qizhi Y. Protocols for secure computations (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, November 1982, 160–164Google Scholar
  6. 6.
    Ran C, Hugo K. Analysis of key exchange protocols and their use for building secure channels. In: Pfitzmann B, ed. Advances in Cryptology—EUROCRYPT 2001. LNCS 2045. Berlin: Springer-Verlag Press, 2001, 453–474Google Scholar
  7. 7.
    Ran C, Hugo K. Security analysis of IKE’s signature-based key exchange protocol. Advances in Cryptology — Crypto 2002, August 2002, 143–161Google Scholar
  8. 8.
    Ran C, Universally composable security: A new paradigm for cryptographic protocols. In: 42th IEEE Annual Symposium on Foundations of Computer Science, 2001, 136–145Google Scholar
  9. 9.
    Birgit P, Michael W. A model for asynchronous reactive systems and its application to secure message transmission. IEEE Symposium on Security and Privacy, Oakland, California, May 2001, 184–200Google Scholar
  10. 10.
    Yehuda L. Composition of secure multi-party protocols — A comprehensive study. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2003. 2815Google Scholar
  11. 11.
    Yehuda L. General composition and universal composability in secure multi-party computation. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. 394–403Google Scholar
  12. 12.
    Ran C. Universally composable two-party and muti-party secure computation. In: 34th STOC. New York: ACM Press, 2002. 494–503Google Scholar
  13. 13.
    Ji Q G, Feng D G. Towards analyzing some kinds of critically formal models for network security protocols (in Chinese). Chi J Comp, 2005, (7): 128–141Google Scholar
  14. 14.
    Ran C, Marc F. Universally Composable Commitments. Lecture Notes in Computer Science, 2139. 2001, 19–28CrossRefGoogle Scholar
  15. 15.
    Ran C, Hugo K. Universally composable notions of key exchange and secure channels. Theory and Application of Cryptographic Techniques, Lecture notes in computer science, Berlin: Springer, 2002. 337–351Google Scholar
  16. 16.
    Ran C, Shai H, Jonathan K, et al. Universally composable password-based key exchange. Eurocrypt, 2005, 404–421Google Scholar
  17. 17.
    Ivan D, Jesper B N. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In CRYPTO, 2002, 581–596Google Scholar
  18. 18.
    Mateus P, Mitchell J, Scedrov C. A composition of cryptographic protocols in a probabilistic polynomial-time process calculus. In: 14th International Conference on Concurrency Theory, LNCS 2761. Berlin: Springer-Verlag, 2003. 327–349Google Scholar
  19. 19.
    Ran C, Hugo K. Universally Composable Symbolic Analysis of Cryptographic Protocols (The Case of Encryption-based Mutual Authentication and Key-Exchange). DIMACS workshop on protocols security analysis, 2004Google Scholar
  20. 20.
    Manoj P, Amit S. New notions of Security: Achieving universal composability without trusted setup. In: STOC’04: Proceedings of the 36th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 2004. 242–251Google Scholar
  21. 21.
    Oded G, Foundations of Cryptography (Fragments of a book). Weizmann Inst. of Science, 1995Google Scholar
  22. 22.
    Shafi G, Silvio M, Ron L R. A digital signature scheme secure against adaptive chosen-message attacks. JOC, 1988, 17(2): 281–308zbMATHGoogle Scholar
  23. 23.
    Ralph C M. Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1980. 122–133Google Scholar
  24. 24.
    Ran C, Universally composable signature, certification, and authentication. In: 17th IEEE Computer Security Foundations Workshop (CSFW), 2004, 219–245Google Scholar
  25. 25.
    Marten T. A universally composable scheme for electronic cash. Indocrypt, 2005, 347–360Google Scholar
  26. 26.
    Michael B, Dennis H. How to break and repair a universally composable signature functionality. In: Information Security Conference-ISC, LNCS 3225, 2004, 61–74Google Scholar

Copyright information

© Science in China Press 2007

Authors and Affiliations

  1. 1.Key Laboratory, of Computer Network and Information Security (Ministry of Education)Xidian UniversityXi’anChina
  2. 2.Mobile Network Security Technology Research CenterKyungpook National UniversityDaeyuKorea

Personalised recommendations