140 likes | 235 Views
Improvement of digital signature with message recovery using self-certified public keys and its variants. Source: Applied Mathematics and Computation Vol.159, Issue 2, 2004, pp. 391-399 Author: Zuhua Shao Speaker: Yi-Fang Cheng Date: 2005/03/31. Outline. Introduction
E N D
Improvement of digital signature with message recovery using self-certified public keys and its variants Source: Applied Mathematics and Computation Vol.159, Issue 2, 2004, pp. 391-399 Author: Zuhua Shao Speaker: Yi-Fang Cheng Date: 2005/03/31
Outline • Introduction • Tseng et al.’s scheme • Security analysis • Improvement • Conclusion
Introduction (1/3) • self-certified public keys • [1] M. Girault, Self-certified public keys, in Advances in Cryptology-EUROCRYPT’91 Springer, Berlin, 1991, pp.491-497 • [2] Hoger Peterson, Patrick Horster, Self-certified keys-Concepts and Applications, Communications and Multimedia Security, Athens, September 22-23,1997
Bob’s Public key valid Trusted CA’s public key valid valid Verify certificate X.509 Bob’s certificate Verify signature invalid invalid Bob’s Public key Trusted CA’s public key Bob’s ID Verify signature invalid Introduction (2/3) • Certificate-certified & self-certified • Diagram: Alice wants to verify Bob’s signature Certificate-certified : Self-certified :
Introduction (3/3) • Tseng et al.’s scheme • 2 variants • Authenticated encryption scheme • Authenticated encryption scheme with message linkages • Security analysis • Insider forgery attack • Forward security • Arbitration security
Tseng et al’s scheme(1/2) • Initialization phase • Trust authority generates system parameters • N: N=p.q, p=2p’+1,q=2q’+1, p,p’,q,q’ are large primes. • h(): hash function with fix-length outputs • g: generator of order p’ . q’ • Join phase • Ui joins the system Ui Trust Authority
Tseng et al’s scheme(2/2) • Signature generation & message recovery phases Signer Ui Verifier
UA UB Variants-Authenticated encryption scheme • Signature generation & message recovery phases
UA UB Variants-Authenticated encryption scheme with message linkages • Signature generation & message recovery phases
Security analysis (1/3) • Insider forgery attack • UB cooperates with trusted authority and forgery a signature {r’,s’} with message M’, where UA signs M’ to Uc
Security analysis (2/3) • Forward security – If third party Eve gets the reveal message M, he can derive other message M’ if h(r)|h(r’)
Security analysis (3/3) • Arbitration security- dispute the signed message will cause weakness.
UA UB Improvement • Solving the arbitration problem
Conclusion • 3 problems in Tseng et al.’s scheme • Solving the third problem