Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?

被引:0
|
作者
Au, Man Ho [1 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
on-line/off-line signatures; divisible on-line/off-line signatures; OS-EU-CMA; DOS-EU-CMA; ONLINE/OFFLINE SIGNATURE; RANDOM ORACLES; SECURITY; IDENTIFICATION; COMPUTATION; SCHEMES; ATTACKS; MESSAGE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On-line/Off-line signatures are useful in many applications where the signer has a very limited response time once the message is presented. The idea is to perform the signing process in two phases. The first phase is performed off-Lbw before the message to be signed is available and the second phase is performed on-line after the message to be signed is provided. Recently, in CT-RSA 2009, Gao et al. made a. very interesting observation that most, of the existing schemes possess the following structure. In the off-line phase, a partial signature, called the off-line token is computed first. Upon completion of the on-line phase, the off-line token constitutes part of the full signature. They considered the "off-line token exposure problem" in which the off-line token is exposed in the off-line phase and introduced a new model to capture this scenario. While intuitively the new requirement appears to be a stronger notion, Gao et at. cannot discover a concrete attack on any of the existing schemes under the new model. They regard clarifying the relationship between the models as an open problem. In this paper, we provide an affirmative answer to this open problem. We construct an On-line/Off-line signature scheme, which is secure under the ordinary security model whilst it is insecure in the new model. Specifically, we present a security proof under the old model and a concrete attack of the scheme tinder the new model. This illustrates that the new model is indeed stronger.
引用
收藏
页码:129 / 139
页数:11
相关论文
共 50 条
  • [1] Divisible On-Line/Off-Line Signatures
    Gao, Chong-zhi
    Wei, Baodian
    Xie, Dongqing
    Tang, Chunming
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 148 - +
  • [2] On-line/off-line digital signatures
    Even, S
    Goldreich, O
    Micali, S
    [J]. JOURNAL OF CRYPTOLOGY, 1996, 9 (01) : 35 - 67
  • [3] Generic on-line/off-line threshold signatures
    Crutchfield, Chris
    Molnar, David
    Turner, David
    Wagner, David
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 58 - 74
  • [4] Generic On-line/Off-line Aggregate Signatures
    Wu, Chunhui
    Xing, Yuqing
    Chen, Xiaofeng
    Long, Dongyang
    Lee, Hyunrok
    Kim, Kwangjo
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 107 - +
  • [5] ON-LINE/OFF-LINE DIGITAL-SIGNATURES
    EVEN, S
    GOLDREICH, O
    MICALI, S
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 263 - 275
  • [6] Pressure Evaluation in On-Line and Off-Line Signatures
    Dimitrova, Desislava
    Gluhchev, Georgi
    [J]. BIOMETRIC ID MANAGEMENT AND MULTIMODAL COMMUNICATION, PROCEEDINGS, 2009, 5707 : 207 - 211
  • [7] Generic on-line/off-line threshold signatures
    Wei Fushan
    Ma Chuangui
    Huang Genxun
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4753 - +
  • [8] Improved on-line/off-line threshold signatures
    Bresson, Emmanuel
    Catalano, Dario
    Gennaro, Rosario
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 217 - +
  • [9] Generating Off-line and On-line Forgeries from On-line Genuine Signatures
    Ferrer, Miguel A.
    Diaz, Moises
    Carmona-Duarte, Cristina
    Plamondon, Rejean
    [J]. 2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [10] Adaptively Secure On-line/Off-line Threshold Signatures
    Gao, Chong-zhi
    Tang, Chunming
    Yao, Zheng-an
    Xie, Dongqing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 508 - +