More Efficient Server Assisted One Time Signatures
نویسنده
چکیده
Server assisted one time signature scheme was recently presented as a nonrepudiation service for mobile and constrained devices. However, the scheme suffered with high storage requirements for the virtual server and high memory requirements for the mobile client. We improve the scheme by significantly reducing virtual server storage requirements as well as mobile client memory requirements. More precisely, the virtual server storage requirements in our scheme are reduced by a factor of more than 80 compared to the original scheme. Further, memory requirements for the mobile client are reduced by a factor of more than 130. This is done by generating various quantities pseudorandomly and storing just their cryptographic hash (instead of storing them fully) wherever possible, while still being able to perform dispute resolution.
منابع مشابه
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
Two most important goals of server assisted signature schemes are to aid small and mobile devices in computing digital signatures and to provide immediate revocation of signing capabilities. In this paper, we introduce an efficient scheme named server assisted one-time signature (SAOTS) alternative to server assisted signature scheme introduced by Asokan et al. Extended the Lamport’s one-time s...
متن کاملImproved server assisted signatures
It is well known that excessive computational demands of public key cryptography have made its use limited especially when constrained devices are of concern. To reduce the costs of generating public key signatures one viable method is to employ a third party; the server. In open networks, getting help from a verifiable-server has an advantage over proxy-based solutions since as opposed to prox...
متن کاملTwo Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures
Secrecy of private signing keys is one of the most important issues in secure electronic commerce. A promising solution to this problem is to distribute the signing function among multiple parties. However, a threshold signature scheme typically assumes that the shared signing function can only be activated by a quorum number of parties, which is inappropriate in settings where a user employs s...
متن کاملEfficient one-time proxy signatures
Proxy signatures allow a signer to delegate signing ability to a proxy signer. Many schemes have been proposed for proxy signatures under typical security requirements. The authors propose a proxy signature model with extended security requirements. Based on Shamir’s online/ offline signature scheme, a proxy signature scheme is proposed for the model. In addition to the typical requirements, th...
متن کاملComputer Aided System for Student’s Knowledge Assessment
Purpose: According with the principles of impartial evaluation of the students’ knowledge, with the national trends in ensuring the efficient and effective end-of-course evaluation, the authors developed an original computer-assisted examination system. Materials and Methods: The information discussed at courses and laboratory class, for the Physical Chemistry Course and for the Microbiology an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2004 شماره
صفحات -
تاریخ انتشار 2004