Server-Supported Signatures

  • N. Asokan
  • G. Tsudik
  • M. Waidner
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1146)

Abstract

Non-repudiation is one of the most important security services. In this paper we present a novel non-repudiation technique, called Server-Supported Signatures, S3. It is based on one-way hash functions and traditional digital signatures. One of its highlights is that for ordinary users the use of asymmetric cryptography is limited to signature verification. S3 is efficient in terms of computational, communication and storage costs. It also offers a degree of security comparable to existing techniques based on asymmetric cryptography.

Keywords

digital signatures non-repudiation electronic commerce network security distributed systems mobility 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [For94]
    Warwick Ford. Computer Communications Security — Principles, Standard Protocols and Techniques. Prentice Hall, New Jersey, 1994.Google Scholar
  2. [HS]
    Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology 3/2 (1991) 99–111.Google Scholar
  3. [ISO95a]
    ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-1 Information Technology — Security Techniques — Non-repudiation — Part1: General Model. ISO/IEC JTC 1/SC 27 N 1105, May 1995.Google Scholar
  4. [ISO95b]
    ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-2 Information Technology — Security Techniques — Non-repudiation — Part2: Using symmetric encipherment algorithms. ISO/IEC JTC 1/SC 27 N 1106, July 1995.Google Scholar
  5. [ISO95c]
    ISO/IEC JTC1, Information Technology, SC 27. ISO/IEC CD 13888-3 Information Technology — Security Techniques — Non-repudiation — Part3: Using asymmetric techniques. ISO/IEC JTC 1/SC 27 N 1107, September 1995.Google Scholar
  6. [Mer87]
    Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology — CRYPTO '87, number 293 in Lecture Notes in Computer Science, pages 369–378, Santa Barbara, CA, USA, August 1987. Springer-Verlag, Berlin Germany.Google Scholar
  7. [Pfi]
    Birgit Pfitzmann. Fail-stop signatures; principles and applications. Proc. Compsec '91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125–134.Google Scholar
  8. [PPW91]
    Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Practical signatures where individuals are unconditionally secure. Unpublished manuscript, available from the authors (pfitzb@informatik.unihildesheim.de), 1991.Google Scholar
  9. [Sch96]
    Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition, 1996.Google Scholar

Copyright information

© Springer-Verlag 1996

Authors and Affiliations

  • N. Asokan
    • 1
    • 2
  • G. Tsudik
    • 1
    • 3
  • M. Waidner
    • 1
  1. 1.IBM Zürich Research LaboratoryRüschlikonSwitzerland
  2. 2.Department of Computer ScienceUniversity of WaterlooWaterlooCanada
  3. 3.Information Sciences InstituteUniversity of Southern CaliforniaUSA

Personalised recommendations