Abstract
Non-repudiation is one of the most important security services. In this paper we present a novel non-repudiation technique, called Server-Supported Signatures, S3. It is based on one-way hash functions and traditional digital signatures. One of its highlights is that for ordinary users the use of asymmetric cryptography is limited to signature verification. S3 is efficient in terms of computational, communication and storage costs. It also offers a degree of security comparable to existing techniques based on asymmetric cryptography.
Chapter PDF
Similar content being viewed by others
Keywords
References
Warwick Ford. Computer Communications Security — Principles, Standard Protocols and Techniques. Prentice Hall, New Jersey, 1994.
Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology 3/2 (1991) 99–111.
ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-1 Information Technology — Security Techniques — Non-repudiation — Part1: General Model. ISO/IEC JTC 1/SC 27 N 1105, May 1995.
ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-2 Information Technology — Security Techniques — Non-repudiation — Part2: Using symmetric encipherment algorithms. ISO/IEC JTC 1/SC 27 N 1106, July 1995.
ISO/IEC JTC1, Information Technology, SC 27. ISO/IEC CD 13888-3 Information Technology — Security Techniques — Non-repudiation — Part3: Using asymmetric techniques. ISO/IEC JTC 1/SC 27 N 1107, September 1995.
Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology — CRYPTO '87, number 293 in Lecture Notes in Computer Science, pages 369–378, Santa Barbara, CA, USA, August 1987. Springer-Verlag, Berlin Germany.
Birgit Pfitzmann. Fail-stop signatures; principles and applications. Proc. Compsec '91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125–134.
Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Practical signatures where individuals are unconditionally secure. Unpublished manuscript, available from the authors (pfitzb@informatik.unihildesheim.de), 1991.
Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition, 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Asokan, N., Tsudik, G., Waidner, M. (1996). Server-Supported Signatures. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds) Computer Security — ESORICS 96. ESORICS 1996. Lecture Notes in Computer Science, vol 1146. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61770-1_32
Download citation
DOI: https://doi.org/10.1007/3-540-61770-1_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61770-9
Online ISBN: 978-3-540-70675-5
eBook Packages: Springer Book Archive