La lecture à portée de main
Description
Sujets
Informations
Publié par | profil-meshug-2012 |
Nombre de lectures | 71 |
Langue | English |
Extrait
RekeyedDigitalSignatureSchemes:
Damage-containmentinthefaceofkeyexposure
MichelAbdalla
MihirBellare
†
July2001
Abstract
Motivatedbytheproblemofdelegatingsigningkeystovulnerablemobiledevices,wede-
nerekeyeddigitalsignatureschemes.Weprovideanadversarymodelandastrongnotionof
securityforsuchschemes,andshowthattheclassicself-certicationparadigm,properlyimple-
mented,provablymeetsthisnotionofsecurity.Wethensuggestaltnerativesolutions,basedon
identicationschemes,andhavingcertainperformancebenetscomparedtoself-certication.
Keywords:
Digitalsignatures,keyexposure,delegation,forwardsecurity,identicationschemes,
proofsofsecurity.
Dept.ofComputerScience&Engineering,UniversityofCaliforniaatSanDiego,9500GilmanDrive,La
Jolla,California92093,USA.E-Mail:
mabdalla@cs.ucsd.edu
.URL:
http://www.michelabdalla.net
.Supported
byCAPESunderGrantBEX3019/95-2.
†
Dept.ofComputerScience&Engineering,UniversityofCaliforniaatSanDiego,9500GilmanDrive,LaJolla,
CA92093,USA.E-mail:
mihir@cs.ucsd.edu
.URL:
http://www-cse.ucsd.edu/users/mihir
.Supportedinpartby
a1996PackardFoundationFellowshipinScienceandEngineering.
1
Contents
1
2
3
4
5
A
B
Introduction
Denitions
Theself-certicationscheme
Therekeyediterated-rootscheme
Comparisonoftworekeyedsignatureschemes
ProofofLemma3.2
ProofofLemma4.4
2
3
5
9
01
41
71
81