Malleable Signatures for Resource Constrained Platforms

Abstract : Malleable signatures allow the signer to control alterations to a signed document. The signer limits alterations to certain parties and to certain parts defined during signature generation. Admissible alterations do not invalidate the signature and do not involve the signer. These properties make them a versatile tool for several application domains, like e-business and health care. We implemented one secure redactable and three secure sanitizable signature schemes on secure, but computationally bounded, smart card. This allows for a secure and practically usable key management and meets legal standards of EU legislation. To gain speed we securely divided the computing tasks between the powerful host and the card; and we devise a new accumulator to yield a useable redactable scheme. The performance analysis of the four schemes shows only a small performance hit by the use of an off-the-shelf card.
Type de document :
Communication dans un congrès
Lorenzo Cavallaro; Dieter Gollmann. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. Springer, Lecture Notes in Computer Science, LNCS-7886, pp.18-33, 2013, Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. 〈10.1007/978-3-642-38530-8_2〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01485931
Contributeur : Hal Ifip <>
Soumis le : jeudi 9 mars 2017 - 15:16:10
Dernière modification le : jeudi 9 mars 2017 - 15:21:21
Document(s) archivé(s) le : samedi 10 juin 2017 - 14:38:04

Fichier

978-3-642-38530-8_2_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Henrich Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann Meer. Malleable Signatures for Resource Constrained Platforms. Lorenzo Cavallaro; Dieter Gollmann. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. Springer, Lecture Notes in Computer Science, LNCS-7886, pp.18-33, 2013, Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. 〈10.1007/978-3-642-38530-8_2〉. 〈hal-01485931〉

Partager

Métriques

Consultations de la notice

118

Téléchargements de fichiers

57