Double-authentication-preventing signatures


Autoria(s): Poettering, Bertram; Stebila, Douglas
Contribuinte(s)

Kutyłowski, Mirosław

Vaidya, Jaideep

Data(s)

25/06/2014

Resumo

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Formato

application/pdf

application/pdf

application/zip

Identificador

http://eprints.qut.edu.au/73005/

Publicador

Springer

Relação

http://eprints.qut.edu.au/73005/61/73005a.pdf

http://eprints.qut.edu.au/73005/13/main_full.pdf

http://eprints.qut.edu.au/73005/3/daps-20140719.zip

DOI:10.1007/978-3-319-11203-9_25

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], Springer, Wroclaw, Poland, pp. 436-453.

EPSRC/EP/H005455/1

EUROPEAN COMMISSION/ICT-2007-216676 ECRYPT II

http://purl.org/au-research/grants/ARC/DP130104304

Direitos

Copyright 2014 Springer

Fonte

Institute for Future Environments; School of Mathematical Sciences; Science & Engineering Faculty

Palavras-Chave #019999 Mathematical Sciences not elsewhere classified #080303 Computer System Security #080402 Data Encryption
Tipo

Conference Paper