21
pages
English
Documents
Le téléchargement nécessite un accès à la bibliothèque YouScribe Tout savoir sur nos offres
21
pages
English
Documents
Le téléchargement nécessite un accès à la bibliothèque YouScribe Tout savoir sur nos offres
RekeyedDigitalSignatureSchemes:
Damage-containmentinthefaceofkeyexposure
MichelAbdalla
MihirBellare
†
July2001
Abstract
Motivatedbytheproblemofdelegatingsigningkeystovulnerablemobiledevices,wede-
nerekeyeddigitalsignatureschemes.Weprovideanadversarymodelandastrongnotionof
securityforsuchschemes,andshowthattheclassicself-certicationparadigm,properlyimple-
mented,provablymeetsthisnotionofsecurity.Wethensuggestaltnerativesolutions,basedon
identicationschemes,andhavingcertainperformancebenetscomparedtoself-certication.
Keywords:
Digitalsignatures,keyexposure,delegation,forwardsecurity,identicationschemes,
proofsofsecurity.
Dept.ofComputerScience&Engineering,UniversityofCaliforniaatSanDiego,9500GilmanDrive,La
Jolla,California92093,USA.E-Mail:
mabdalla@cs.ucsd.edu
.URL:
http://www.michelabdalla.net
.Supported
byCAPESunderGrantBEX3019/95-2.
†
Dept.ofComputerScience&Engineering,UniversityofCaliforniaatSanDiego,9500GilmanDrive,LaJolla,
CA92093,USA.E-mail:
mihir@cs.ucsd.edu
.URL:
http://www-cse.ucsd.edu/users/mihir
.Supportedinpartby
a1996PackardFoundationFellowshipinScienceandEngineering.
1
Contents
1
2
3
4
5
A
B
Introduction
Denitions
Theself-certicationscheme
Therekeyediterated-rootscheme
Comparisonoftworekeyedsignatureschemes
ProofofLemma3.2
ProofofLemma4.4
2
3
5
9
01
41
71
81