File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TrustCom50675.2020.00119
- Scopus: eid_2-s2.0-85101238030
- WOS: WOS:000671077600105
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Address-Based Signature
Title | Address-Based Signature |
---|---|
Authors | |
Keywords | Signature Address Blockchain |
Issue Date | 2020 |
Publisher | IEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome/1800729/all-proceedings |
Citation | Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020 - 1 January 2021, p. 884-891 How to Cite? |
Abstract | In most applications using digital signatures, public keys are used to verify the signatures. The public keys are authenticated by a trusted certificate authority. However, this chain of trust is fragile in the real world. Systems like blockchain and eXpressive Internet Architecture (XIA) proposed to use the hash of a public key as an address. Then signatures are verified against addresses. In this paper, we first formalize the notion of address-based signatures to analyze the security of these address-based systems. We give a strong model which considers the security of multiple addresses, with respect to attackers who even know the randomness used by the system developers. The formalization of security model is important to understand the security of real world system. We propose an efficient and secure construction of address-based signature, which can overcome the existing problems of address-based ECDSA and Schnorr signatures. Then we give two generic constructions of address-based signatures. We find out that these solutions are either not efficient enough (in terms of signature size and address size) or not secure enough. |
Persistent Identifier | http://hdl.handle.net/10722/297294 |
ISSN | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, H | - |
dc.contributor.author | Yuen, TH | - |
dc.date.accessioned | 2021-03-08T07:16:56Z | - |
dc.date.available | 2021-03-08T07:16:56Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020 - 1 January 2021, p. 884-891 | - |
dc.identifier.issn | 2324-898X | - |
dc.identifier.uri | http://hdl.handle.net/10722/297294 | - |
dc.description.abstract | In most applications using digital signatures, public keys are used to verify the signatures. The public keys are authenticated by a trusted certificate authority. However, this chain of trust is fragile in the real world. Systems like blockchain and eXpressive Internet Architecture (XIA) proposed to use the hash of a public key as an address. Then signatures are verified against addresses. In this paper, we first formalize the notion of address-based signatures to analyze the security of these address-based systems. We give a strong model which considers the security of multiple addresses, with respect to attackers who even know the randomness used by the system developers. The formalization of security model is important to understand the security of real world system. We propose an efficient and secure construction of address-based signature, which can overcome the existing problems of address-based ECDSA and Schnorr signatures. Then we give two generic constructions of address-based signatures. We find out that these solutions are either not efficient enough (in terms of signature size and address size) or not secure enough. | - |
dc.language | eng | - |
dc.publisher | IEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome/1800729/all-proceedings | - |
dc.relation.ispartof | 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) | - |
dc.rights | International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Copyright © IEEE. | - |
dc.rights | ©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | - |
dc.subject | Signature | - |
dc.subject | Address | - |
dc.subject | Blockchain | - |
dc.title | Address-Based Signature | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Yuen, TH: johnyuen@hku.hk | - |
dc.identifier.authority | Yuen, TH=rp02426 | - |
dc.description.nature | postprint | - |
dc.identifier.doi | 10.1109/TrustCom50675.2020.00119 | - |
dc.identifier.scopus | eid_2-s2.0-85101238030 | - |
dc.identifier.hkuros | 321452 | - |
dc.identifier.spage | 884 | - |
dc.identifier.epage | 891 | - |
dc.identifier.isi | WOS:000671077600105 | - |
dc.publisher.place | United States | - |
dc.identifier.issnl | 2324-9013 | - |