File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Server-aided signatures verification secure against collusion attack

TitleServer-aided signatures verification secure against collusion attack
Authors
KeywordsDelegation
Pairings
Server-aided computation
Signatures
Issue Date2011
Citation
Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 401-405 How to Cite?
AbstractWireless handheld devices which support e-mail and web browsing are increasingly popular. The authenticity of the information received is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe the server to launch various kinds of attacks - to convince that an invalid signature held by a client is a valid one (say for providing false information or repudiable commitment) or to claim that a valid signature is invalid (say for spoiling the offer provided by an opponent). However, these concerns are not properly captured by existing security models. In this paper, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault and Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. Copyright 2011 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/280536

 

DC FieldValueLanguage
dc.contributor.authorChow, Sherman S.M.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.date.accessioned2020-02-17T14:34:17Z-
dc.date.available2020-02-17T14:34:17Z-
dc.date.issued2011-
dc.identifier.citationProceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 401-405-
dc.identifier.urihttp://hdl.handle.net/10722/280536-
dc.description.abstractWireless handheld devices which support e-mail and web browsing are increasingly popular. The authenticity of the information received is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe the server to launch various kinds of attacks - to convince that an invalid signature held by a client is a valid one (say for providing false information or repudiable commitment) or to claim that a valid signature is invalid (say for spoiling the offer provided by an opponent). However, these concerns are not properly captured by existing security models. In this paper, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault and Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. Copyright 2011 ACM.-
dc.languageeng-
dc.relation.ispartofProceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011-
dc.subjectDelegation-
dc.subjectPairings-
dc.subjectServer-aided computation-
dc.subjectSignatures-
dc.titleServer-aided signatures verification secure against collusion attack-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1966913.1966967-
dc.identifier.scopuseid_2-s2.0-79956040239-
dc.identifier.spage401-
dc.identifier.epage405-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats