Self-certified Signatures

نویسندگان

  • Byoungcheon Lee
  • Kwangjo Kim
چکیده

A digital signature provides the authenticity of a signed message with respect to a public key and a certificate provides the authorization of a signer for a public key. Digital signature and certificate are generated independently by different parties, but they are verified by the same verifier who wants to verify the signature. In the point of a verifier, verifying two independent digital signatures (a digital signature and the corresponding certificate) is a burden. In this paper we propose a new digital signature scheme called selfcertified signature. In this scheme a signer computes a temporary signing key with his long-term signing key and its certification information together, and generates a signature on a message and certification information using the temporary signing key in a highly combined and unforgeable manner. Then, a verifier verifies both signer’s signature on the message and related certification information together. This approach is very advantageous in efficiency. We extend the proposed self-certified signature scheme to multi-certification signature in which multiple certification information need to be verified. We apply it to public key infrastructure (PKI) and privilege management infrastructure (PMI) environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of A Self-Certified Threshold Proxy Signature Scheme Ased on Elliptic Curve Discrete Logarithm Problem

Digital signatures based on self-certified public key systems are more efficient because the authentication of the users’ public keys can be implicitly accomplished with the signature verification. In 2009, Xue et al. proposed first self-certified threshold proxy signature scheme based on the elliptic curve discrete logarithm problem (ECDLP). In this paper, we show that Xue et al.’s scheme can ...

متن کامل

On the Linkability of Some Group Signature Schemes

A group signature scheme is a digital signature scheme that allows a group member to sign messages anonymously on behalf of the group. Recently, Tseng and Jan proposed two group signature schemes based on self-certified and ID-based public keys respectively. However, these two schemes were shown to be insecure against forgery due to Joye et al. Later, Sun et al. showed that Tseng and Jan’s self...

متن کامل

Efficient Three-Term Simultaneous Elliptic Scalar Multiplication with Applications

An application of n-term Joint Sparse Form to three-term simultaneous elliptic scalar multiplication is presented. This is shown to significantly improve performance in comparison to processing the scalar multiplications individually. A practical application of the results is provided using Self-Certified signatures. These results are particularly useful when compact and fast signatures are nee...

متن کامل

On the Difficulty of Coalition-Resistance in Group Signature Schemes (II)

This report continues a discussion begun in the LCIS-98-17B report. As for the Ateniese-Tsudik schemes, we show that both the ID-based and self-certified public keys based group signature schemes proposed by Tseng and Jan (1998/1999) are not coalition-resistant: two colluding group members can produce untraceable group signatures. Indexing terms: Digital signatures, Group signatures

متن کامل

Improvement of Threshold Signature Using Self-certified Public Keys

A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...

متن کامل

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System

In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002