Skip to main content

Revisiting Oblivious Signature-Based Envelopes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4107))

Abstract

In this paper, we investigate an interesting and practical cryptographic construct – Oblivious Signature-Based Envelopes (OSBEs) – recently introduced in [15]. OSBEs allow a sender to communicate information to a receiver such that the latter’s rights (or roles) are unknown to the former. At the same time, a receiver can obtain the information only if it is authorized to access it. This makes OSBEs a natural fit for anonymity-oriented and privacy-preserving applications. Previous results yielded three OSBE constructs: one based on RSA and two based on Identity-Based Encryption (IBE). Our work focuses on the ElGamal signature family: we succeed in constructing practical and secure OSBE schemes for several well-known signature schemes, including: Schnorr, Nyberg-Rueppel, ElGamal and DSA. As illustrated by experiments with a prototype implementation, our schemes are more efficient than previous techniques. Furthermore, we show that some OSBE schemes, despite offering affiliation privacy for the receiver, result in no additional cost over schemes that do not offer this feature.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. IEEE Journal on Selected Areas in Communications 18(4) (April 2000)

    Google Scholar 

  2. Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.: Secret Handshakes from Pairing-Based Key Agreements. In: Proceedings of IEEE Symposium on Research in Security and Privacy (May 2003)

    Google Scholar 

  3. Bao, F., Deng, R., Mao, W.: Efficient and Practical Fair Exchange Protocols with Off-line TTP. In: Proceedings of 1998 IEEE Symposium on Security and Privacy (May 1998)

    Google Scholar 

  4. Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements and a Construction Based on General Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)

    Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal of Computing 32(3), 586–615 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  6. Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Bradshaw, R., Holt, J., Seamons, K.: Concealing Complex Policies with Hidden Credentials. In: Proceedings of ACM CCS 2004 (2004)

    Google Scholar 

  8. Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)

    Google Scholar 

  9. Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from ca-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Chaum, D.: Blind Signatures for Untraceable Payments. In: Proceedings of CRYPTO 1982 (1982)

    Google Scholar 

  11. Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE ToIT 22, 644–654 (1976)

    MATH  MathSciNet  Google Scholar 

  13. ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4) (1985)

    Google Scholar 

  14. Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)

    Google Scholar 

  15. Li, N., Du, W., Boneh, D.: Oblivious Signature-Based Envelopes. In: Proceedings of ACM Symposium on Principles of Distributed Computing (PODC 2003) (2003) (2005): Extended version to appear in of Distributed Computing

    Google Scholar 

  16. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, Ch. 11, 2nd edn. CRC Press, Boca Raton (2001)

    Google Scholar 

  17. National Institute of Standards and Technology, Digital Signature Standard, NIST FIPS PUB 186, U.S. Department of Commerce (1994)

    Google Scholar 

  18. Nyberg, K., Rueppel, R.: A New Signature Scheme Based on DSA Giving Message Recovery. In: Proceedings of ACM Conference on Computer and Communications Security (November 1993)

    Google Scholar 

  19. S. Nasserian and G. Tsudik, Revisiting Oblivious Signature-Based Envelopes, Cryptology ePrint Archive Report 2005/283. avaiable at http://eprint.iacr.org/2005/283

  20. Pohlig, S., Hellman, M.: An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance. IEEE Transactions on Information Theory 24, 106–110 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  21. Pointcheval, D., Stern, J.: Security Proofs for Signature Schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)

    Google Scholar 

  22. Schnorr, C.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4, 161–174 (1991)

    Article  MATH  Google Scholar 

  23. Xu, S., Yung, M.: k-Anonymous Secret Handshakes with Reusable Credentials. In: Proceedings of ACM CCS 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nasserian, S., Tsudik, G. (2006). Revisiting Oblivious Signature-Based Envelopes. In: Di Crescenzo, G., Rubin, A. (eds) Financial Cryptography and Data Security. FC 2006. Lecture Notes in Computer Science, vol 4107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11889663_19

Download citation

  • DOI: https://doi.org/10.1007/11889663_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46255-2

  • Online ISBN: 978-3-540-46256-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics