Abstract
One-time signatures are an important and efficient authentication utility. Various schemes already exist for the classical one-way public-key cryptography. One-time signatures have not been sufficiently explored in the literature in the branch of society-oriented cryptography. Their particular properties make them suitable, as a potential cryptographic primitive, for broadcast communication and group-based applications. In this paper, we try to contribute to filling this gap by introducing several group-based one-time signature schemes of various versions: with proxy, with trusted party, and without trusted party.
Chapter PDF
Similar content being viewed by others
Keywords
References
Al-Ibrahim, M., Pieprzyk, J.: Authentication of transit flows and K-siblings one-time signature. In: Jerman-Blazic, B., Klobucar, T. (eds.) Advanced Communications and Multimedia Security CMS 2002, Portoroz – Slovenia, September 2002, pp. 41–55. Kluwer Academic Publisher, Dordrecht (2002)
Al-Ibrahim, M., Cerny, A.: Authentication of anycast communication. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 425–429. Springer, Heidelberg (2003)
Bos, J.N.E., Chaum, D.: Provably unforgeable signatures. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 1–14. Springer, Heidelberg (1992)
Boyd, C.: Digital Multisignatures. In: Beker, H., Piper, F. (eds.) Cryptography and coding, pp. 241–246. Clarendon Press, Oxford (1989)
Desmet, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
ElGamal, T.: A Public key cryptosystem and a signature scheme based on discrete Logarithms. IEEE Trans. on Inform. Theory IT-31, 469–472 (1985)
Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. Journal of Cryptology 9(1), 35–67 (1996)
Gennaro, R., Rohatchi, P.: How to sign digital streams. In: McCune, W. (ed.) CADE 1997. LNCS, vol. 1249, pp. 180–197. Springer, Heidelberg (1997)
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33(4), 792–807 (1986)
Goldwasser, S., Micali, S., Rackoff, C.: A Digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17, 281–308 (1988)
Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using one-time proxy Signature. In: Proc. of SCIS 2001, pp. 845–850. IEEE press, Los Alamitos (2001)
Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International, Palo Alto (1979)
Li, C.M., Hwang, T., Lee, N.Y.: Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 194–204. Springer, Heidelberg (1995)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. IEICE Trans. Fundamentals E79-A(9), 1338–1354 (1996)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Merkle, R.: A Certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1989)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)
Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: ACM, CCS 2001, pp. 28–37 (2001)
Pieprzyk, J., Hordajano, T., Seberry, J.: Fundamentals of computer security. Springer, Heidelberg (2003)
Pieprzyk, J., Wang, H., Xing, C.: Multiple-time signature schemes secure against adaptive chosen message attack. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, Springer, Heidelberg (2003) (to appear)
Rabin, M.O.: Digitalized signatures. In: DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Foundations of Secure Computation, pp. 155–168. Academic Press, London (1978)
Reyzin, L., Reyzin, N.: Better than BiBa: short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144–152. Springer, Heidelberg (2002)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Rohatchi, P.: A Compact and fast hybrid signature scheme for multicast packet authentication. In: Proc. of 6th ACM Conference on Computer and Communications Security, pp. 93–100 (1999)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Zhang, K.: Threshold proxy signature scheme. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Al-Ibrahim, M., Cerny, A. (2003). Proxy and Threshold One-Time Signatures. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive