Autotomic signatures

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Digital signature security is classically defined as an interaction between a signer S sk, a verifier V pk and an attacker A. A submits adaptively to S sk a sequence of messages m 1, ⋯, m q to which S sk replies with the signatures U = {σ 1, ⋯, σ q}. Given U, A attempts to produce a forgery, i.e. a pair (m', σ') such that V pk (m', σ') = true and σ' ∉ U. The traditional approach consists in hardening S sk against a large query bound q. Interestingly, this is one specific way to prevent from winning the forgery game. This work explores an alternative option. Rather than hardening S sk, we weaken A by preventing him from influencing S sk's input: upon receiving m i, S sk will generate a fresh ephemeral signature key-pair (sk i, pk i), use sk i to sign m i , erase sk i, and output the signature and a certificate on pk i computed using the long-term key sk. In other words, S sk will only use his permanent secret to sign inputs which are beyond A's control (namely, freshly generated public-keys). As the are ephemeral, q = 1 by construction. We show that this paradigm, called autotomic signatures, transforms weakly secure signature schemes (secure against generic attacks only) into strongly secure ones (secure against adaptively chosen-message attacks). As a by-product of our analysis, we show that blending public key information with the signed message can significantly increase security. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Naccache, D., & Pointcheval, D. (2012). Autotomic signatures. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6805 LNCS, 143–155. https://doi.org/10.1007/978-3-642-28368-0_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free