The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures

  • Tal Malkin
  • Satoshi Obana
  • Moti Yung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3027)

Abstract

For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexibility of signers within organizations and among entities). On the other hand, various notions of the key-evolving signature paradigms (forward-secure, key-insulated, and intrusion-resilient signatures) have been suggested in the last few years for protecting the security of signature schemes, localizing the damage of secret key exposure.

In this work we relate the various notions via direct and concrete security reductions that are tight. We start by developing the first formal model for fully hierarchical proxy signatures, which, as we point out, also addresses vulnerabilities of previous schemes when self-delegation is used. Next, we prove that proxy signatures are, in fact, equivalent to key-insulated signatures. We then use this fact and other results to establish a tight hierarchy among the key-evolving notions, showing that intrusion-resilient signatures and key-insulated signatures are equivalent, and imply forward-secure signatures. We also introduce other relations among extended notions.

Besides the importance of understanding the relationships among the various notions that were originally designed with different goals or with different system configuration in mind, our findings imply new designs of schemes. For example, many proxy signatures have been presented without formal model and proofs, whereas using our results we can employ the work on key-insulated schemes to suggest new provably secure designs of proxy signatures schemes.

References

  1. 1.
    Anderson, R.: Two remarks on public key cryptology (2001), available at http://www.cl.cam.ac.uk/users/rja14/
  2. 2.
    Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 15–19. Springer, Heidelberg (1999)Google Scholar
  3. 3.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights, IACR ePrint Archive (2003), available at http://eprint.iacr.org/2003/096/
  4. 4.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Gassr, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital Distributed Security Architecture. In: Proc. National Computer Security Conference (1989)Google Scholar
  7. 7.
    Itkis, G.: Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 102–118. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Itkis, G., Reyzin, L.: SiBIR: Signer-Base Intrusion-Resilient Signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 499–514. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Kozlov, A., Reyzin, L.: Forward-Secure Signatures with Fast Key Update. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 241–256. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: Proc. the 7th ACM Conference on Computer and Communications Security, pp. 108–115 (2000)Google Scholar
  12. 12.
    Malkin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 400–417. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures (2004), full version of this paper available at the IACR ePrint Archive, http://eprint.iacr.org/2004/052
  14. 14.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. the 3rd ACM Conference on Computer and Communications Security, pp. 48–57 (1996)Google Scholar
  15. 15.
    Naor, M., Yung, M.: Universal One-Way Hash Functions and their Cryptographic Applications. In: Proceedings of the ACM Symposium on Theory of Computing, pp. 33–43 (1989)Google Scholar
  16. 16.
    Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the ACM Symposium on Theory of Computing, pp. 387–394 (1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Tal Malkin
    • 1
  • Satoshi Obana
    • 2
  • Moti Yung
    • 1
  1. 1.Columbia University 
  2. 2.NEC and Columbia University 

Personalised recommendations