File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Server-aided signatures verification secure against collusion attack

TitleServer-aided signatures verification secure against collusion attack
Authors
KeywordsSignatures
Collusion attack
Delegation
Pairings
Server-aided computation
Weak computational device
Issue Date2013
Citation
Information Security Technical Report, 2013, v. 17, n. 3, p. 46-57 How to Cite?
AbstractWireless handheld devices are increasingly popular. The authenticity of the information or a program to be downloaded is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to an untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe (or collude with) the server either to convince that an invalid signature is a valid one or to claim that a valid signature is invalid (say for providing repudiable information/commitment, or spoiling an opponent's offer). However, these concerns are not properly captured by existing models. In this paper, we infer the meaning behind and point out the subtleties in existing models; and propose a new model to capture the collusion attack. We also show that two existing schemes are insecure in their own model. Finally, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault-Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. © 2012 Elsevier Ltd. All rights reserved.
Persistent Identifierhttp://hdl.handle.net/10722/280791
ISSN

 

DC FieldValueLanguage
dc.contributor.authorChow, Sherman S.M.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.date.accessioned2020-02-17T14:34:57Z-
dc.date.available2020-02-17T14:34:57Z-
dc.date.issued2013-
dc.identifier.citationInformation Security Technical Report, 2013, v. 17, n. 3, p. 46-57-
dc.identifier.issn1363-4127-
dc.identifier.urihttp://hdl.handle.net/10722/280791-
dc.description.abstractWireless handheld devices are increasingly popular. The authenticity of the information or a program to be downloaded is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to an untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe (or collude with) the server either to convince that an invalid signature is a valid one or to claim that a valid signature is invalid (say for providing repudiable information/commitment, or spoiling an opponent's offer). However, these concerns are not properly captured by existing models. In this paper, we infer the meaning behind and point out the subtleties in existing models; and propose a new model to capture the collusion attack. We also show that two existing schemes are insecure in their own model. Finally, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault-Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. © 2012 Elsevier Ltd. All rights reserved.-
dc.languageeng-
dc.relation.ispartofInformation Security Technical Report-
dc.subjectSignatures-
dc.subjectCollusion attack-
dc.subjectDelegation-
dc.subjectPairings-
dc.subjectServer-aided computation-
dc.subjectWeak computational device-
dc.titleServer-aided signatures verification secure against collusion attack-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/j.istr.2012.10.007-
dc.identifier.scopuseid_2-s2.0-84875259808-
dc.identifier.volume17-
dc.identifier.issue3-
dc.identifier.spage46-
dc.identifier.epage57-
dc.identifier.issnl1363-4127-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats