Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/DASC.2006.46guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware

Published: 29 September 2006 Publication History

Abstract

We introduce the notion of tamper-evidence for digital signature generation in order to defend against attacks aimed at covertly leaking secret information held by corrupted signing nodes. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. We call our signature schemes tamper-evident since any deviation from the protocol is immediately detectable. We demonstrate our technique for the RSA-PSS (known as RSA's Probabilistic Signature Scheme) and DSA signature schemes and show how the same technique can be applied to the Schnorr and Feige-Fiat-Shamir (FFS) signature schemes. Our technique does not modify the distribution of the generated signature transcripts, and has only a minimal overhead in terms of computation, communication, and storage.

Cited By

View all
  • (2017)A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4599-z97:3(3331-3353)Online publication date: 1-Dec-2017
  • (2012)An 802.11 MAC layer covert channelWireless Communications & Mobile Computing10.1002/wcm.96912:5(393-405)Online publication date: 1-Apr-2012
  • (2009)Authentication in 802.11 LANs using a covert side channelProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817464(1034-1039)Online publication date: 14-Jun-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
DASC '06: Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
September 2006
348 pages
ISBN:0769525393

Publisher

IEEE Computer Society

United States

Publication History

Published: 29 September 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4599-z97:3(3331-3353)Online publication date: 1-Dec-2017
  • (2012)An 802.11 MAC layer covert channelWireless Communications & Mobile Computing10.1002/wcm.96912:5(393-405)Online publication date: 1-Apr-2012
  • (2009)Authentication in 802.11 LANs using a covert side channelProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817464(1034-1039)Online publication date: 14-Jun-2009
  • (2009)Server-side detection of malware infectionProceedings of the 2009 workshop on New security paradigms workshop10.1145/1719030.1719033(11-22)Online publication date: 8-Sep-2009
  • (2008)Providing VANET security through active position detectionComputer Communications10.1016/j.comcom.2008.01.00931:12(2883-2897)Online publication date: 15-Jul-2008
  • (2007)Covert channels in privacy-preserving identification systemsProceedings of the 14th ACM conference on Computer and communications security10.1145/1315245.1315283(297-306)Online publication date: 28-Oct-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media