Outsourcing digital signatures: a solution to key management burden

نویسندگان

  • Dimitrios Lekkas
  • Costas Lambrinoudakis
چکیده

Digital signatures are only enjoying a gradual and reluctant acceptance, despite the long existence of the relevant legal and technical frameworks. One of the major drawbacks of client-generated digital signatures is the requirement for effective and secure management of the signing keys and the complexity of the cryptographic operations that must be performed by the signer. Outsourcing digital signatures to a Trusted Third Party would be an elegant solution to the key management burden. We investigate whether this is legally and technically feasible and we propose a framework for outsourced digital signatures. In our approach a relying party trusts a Signature Authority for the tokens it issues, rather than a Certification Authority for the certificates it creates in a traditional PKI scheme. Given that a signing request is strongly authenticated, we argue that passing the control of signature creation to a Signature Authority rather than the signer file:///C|/Documents and Settings/dlek/My Documents/Papers/DS_outsourcing/2006IMCS.htm (1 of 16)8/10/2006 10:51:16 •• Outsourcing Digital Signatures: A solution to key management burden herself, is not a stronger concession than the dependence on an identity certificate issued by a Certification Authority.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Theory and Practice of Personal Digital Signatures

We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. We then propose a protocol for issuing digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most on...

متن کامل

Certi cateless Aggregate Short Signature Scheme

An aggregate signature scheme is the aggregation of multiple signatures into a single compact signature of short string that can convince to any arbitrary verifier participating in the scheme. The aggregate signature scheme is very useful for real-world cryptographic applications such as secure routing, database outsourcing etc where the signatures on several distinct messages generated by many...

متن کامل

Self-certified Signatures

A digital signature provides the authenticity of a signed message with respect to a public key and a certificate provides the authorization of a signer for a public key. Digital signature and certificate are generated independently by different parties, but they are verified by the same verifier who wants to verify the signature. In the point of a verifier, verifying two independent digital sig...

متن کامل

A weighted Additive Fuzzy Programming Approach for Logistics Outsourcing Selection in Car Industry

Logistics outsourcing has been at the top of the management agenda during recent decades. The selection of the proper service supplier is the key to success in logistic outsourcing Firms could select the right supplier by applying appropriate methods and selection criteria. In this paper a new framework is proposed on the basis of weighted additive fuzzy programming approach and linear programm...

متن کامل

The Italian Legislation on Digital Signatures and the Role of Italian Banks as Certificate Authorities: A Strategic Analysis

The recent adoption in Italy of a legislation stating the full equivalence of digital and handwritten signatures gives any institution with the appropriate requirements the opportunity to act as Certificate Authorities (CA) for digital signatures. This rises the question whether the CA role could be of potential interest for the Italian banks. The present analysis is focused on the Italian bank...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2006