File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1966913.1966967
- Scopus: eid_2-s2.0-79956040239
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Server-aided signatures verification secure against collusion attack
Title | Server-aided signatures verification secure against collusion attack |
---|---|
Authors | |
Keywords | Delegation Pairings Server-aided computation Signatures |
Issue Date | 2011 |
Citation | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 401-405 How to Cite? |
Abstract | Wireless handheld devices which support e-mail and web browsing are increasingly popular. The authenticity of the information received is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe the server to launch various kinds of attacks - to convince that an invalid signature held by a client is a valid one (say for providing false information or repudiable commitment) or to claim that a valid signature is invalid (say for spoiling the offer provided by an opponent). However, these concerns are not properly captured by existing security models. In this paper, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault and Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. Copyright 2011 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/280536 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, Sherman S.M. | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.date.accessioned | 2020-02-17T14:34:17Z | - |
dc.date.available | 2020-02-17T14:34:17Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 401-405 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280536 | - |
dc.description.abstract | Wireless handheld devices which support e-mail and web browsing are increasingly popular. The authenticity of the information received is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server. This allows resource-constrained devices to enjoy the security guarantees provided by cryptographic schemes, such as pairing-based signatures, which may be too heavyweight to verify otherwise. To gain unfair advantage, an adversary may bribe the server to launch various kinds of attacks - to convince that an invalid signature held by a client is a valid one (say for providing false information or repudiable commitment) or to claim that a valid signature is invalid (say for spoiling the offer provided by an opponent). However, these concerns are not properly captured by existing security models. In this paper, we provide a generic pairing-based SAV protocol. Compared with the protocol of Girault and Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems. In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before. Copyright 2011 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | - |
dc.subject | Delegation | - |
dc.subject | Pairings | - |
dc.subject | Server-aided computation | - |
dc.subject | Signatures | - |
dc.title | Server-aided signatures verification secure against collusion attack | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1966913.1966967 | - |
dc.identifier.scopus | eid_2-s2.0-79956040239 | - |
dc.identifier.spage | 401 | - |
dc.identifier.epage | 405 | - |