Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Mathematical Cryptology

Managing Editor: Magliveras, Spyros S. / Steinwandt, Rainer / Trung, Tran

Editorial Board: Blackburn, Simon R. / Blundo, Carlo / Burmester, Mike / Cramer, Ronald / Dawson, Ed / Gilman, Robert / Gonzalez Vasco, Maria Isabel / Grosek, Otokar / Helleseth, Tor / Kim, Kwangjo / Koblitz, Neal / Kurosawa, Kaoru / Lauter, Kristin / Lange, Tanja / Menezes, Alfred / Nguyen, Phong Q. / Pieprzyk, Josef / Rötteler, Martin / Safavi-Naini, Rei / Shparlinski, Igor E. / Stinson, Doug / Takagi, Tsuyoshi / Williams, Hugh C. / Yung, Moti

4 Issues per year


CiteScore 2017: 1.43

SCImago Journal Rank (SJR) 2017: 0.293
Source Normalized Impact per Paper (SNIP) 2017: 1.117

Mathematical Citation Quotient (MCQ) 2017: 0.51

Online
ISSN
1862-2984
See all formats and pricing
More options …
Volume 10, Issue 1

Issues

Unconditionally secure signature schemes revisited

Colleen M. Swanson / Douglas R. Stinson
  • Corresponding author
  • David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2016-04-01 | DOI: https://doi.org/10.1515/jmc-2016-0002

Abstract

Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents without the reliance on computational assumptions needed in traditional digital signatures. Unlike digital signatures, USS schemes require that verification algorithms are not public – for any possible signer, a given user must have a different secret verification algorithm corresponding to that signer. Thus, any viable security definition for a USS scheme must carefully treat the subject of what constitutes a valid signature. That is, it is important to distinguish between signatures that are created using a user's signing algorithm and signatures that may satisfy one or more user verification algorithms. Moreover, given that each verifier has his own distinct verification algorithm, a USS scheme must necessarily handle the event of a disagreement. In this paper, we present a new security model for USS schemes that incorporates these notions, as well as give a formal treatment of dispute resolution and the trust assumptions required. We provide formal definitions of non-repudiation and transferability in the context of dispute resolution, and give sufficient conditions for a USS scheme to satisfy these properties. We then extend our basic framework to the setting of strong key-insulated signatures, which increase robustness against key exposure. Finally, we give security analyses for two constructions: Hanaoka et al.'s construction, which we show is secure in our basic USS model, and a key-insulated extension of this construction, which is secure in our strong key-insulated model. This is an extended version of the conference paper [Lecture Notes in Comput. Sci. 6673, Springer, Berlin (2011), 100–116], which appeared in ICITS 2011.

Keywords: Digital signatures; information-theoretic security; unconditionally secure signature schemes; key-insulation; dispute resolution

MSC: 94A60

About the article

Received: 2016-01-04

Revised: 2016-03-14

Accepted: 2016-03-16

Published Online: 2016-04-01

Published in Print: 2016-03-01


Funding Source: NSERC

Award identifier / Grant number: 203114-11


Citation Information: Journal of Mathematical Cryptology, Volume 10, Issue 1, Pages 35–67, ISSN (Online) 1862-2984, ISSN (Print) 1862-2976, DOI: https://doi.org/10.1515/jmc-2016-0002.

Export Citation

© 2016 by De Gruyter.Get Permission

Comments (0)

Please log in or register to comment.
Log in