Server Assisted Signatures Revisited

  • Kemal Bicakci
  • Nazife Baykal
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2964)


One of the main objectives of server-assisted computation is to reduce the cost of generating public key signatures for ordinary users with their constrained devices. On the other hand, based on nothing more than a one-way function, one-time signatures provide an attractive alternative to public key signatures. This paper revisits server assisted computation for digital signatures to show server assisted one-time signature (SAOTS) that combines the benefits of these two efficiency solutions. The proposed protocol turns out to be a more computational and round-efficient protocol than previous verifiable-server approaches. In addition, SAOTS offers other advantages like verification transparency, getting rid of public key operations for the ordinary user and proving the server’s cheating without storing the signatures.


server-assisted signature one-time signature digital signature pervasive computing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)Google Scholar
  2. 2.
    National Institute for Standards and Technology: Digital Signature Standard (DSS), Federal Register, 56(169), August 30 (1991)Google Scholar
  3. 3.
    National Institute of Standards and Technology: FIPS Publication 180: Secure Hash Standard (SHS), May 11 (1993)Google Scholar
  4. 4.
    Rivest, R.L.: The MD5 message-digest algorithm. Internet Request for Comments. RFC 1321 (April 1992)Google Scholar
  5. 5.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11) (1981)Google Scholar
  6. 6.
    Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International (October 1979)Google Scholar
  7. 7.
    Bicakci, K., Tsudik, G., Tung, B.: How to construct optimal one-time signatures. Computer Networks (Elsevier) 43(3) (October 2003)Google Scholar
  8. 8.
    Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  10. 10.
    Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy- Based Security Protocols in Networked Mobile Devices. In: Proceedings of the 17th ACM Symposium on Applied Computing (Security Track) (March 2002)Google Scholar
  11. 11.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights. Cryptology ePrint Archive, Report 2003/096 (2003),
  12. 12.
    Beguin, P., Quisquater, J.J.: Fast server-aided RSA signatures secure against active attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 57–69. Springer, Heidelberg (1995)Google Scholar
  13. 13.
    Nguyen, P., Stern, J.: The Beguin-Quisquater server-aided RSA protocol from Crypto ’95 is not secure. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 372–379. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Jakobsson, M., Wetzel, S.: Secure Server-Aided Signature Generation. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Asokan, N., Tsudik, G., Waidners, M.: Server-supported signatures. Journal of Computer Security (November 1997)Google Scholar
  16. 16.
    Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: 2002 Network and Distributed Systems Security Symposium (NDSS 2002) (February 2002)Google Scholar
  17. 17.
    Bicakci, K., Baykal, N.: SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 187–200. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Bicakci, K., Baykal, N.: Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. In: Proc. of IEEE 8th Symposium on Computers and Communications, ISCC 2003, Antalya, Turkey (2003)Google Scholar
  19. 19.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)Google Scholar
  20. 20.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)Google Scholar
  21. 21.
    Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: Internet public key infrastructure online certificate status protocol. RFC 2560 (June 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Kemal Bicakci
    • 1
  • Nazife Baykal
    • 1
  1. 1.Informatics InstituteMiddle East Technical UniversityAnkaraTurkey

Personalised recommendations