Universally composable signature, certification, and authentication
R Canetti - … Computer Security Foundations Workshop, 2004., 2004 - ieeexplore.ieee.org
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004•ieeexplore.ieee.org
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This
modeling of digital signatures potentially has some significant analytical advantages (such
as enabling component-wise analysis of complex systems that use signature schemes, as
well as symbolic and automatable analysis of such systems). However, it turns out that
formulating ideal functionalities that capture the properties expected from signature schemes …
signature schemes as an ideal functionality within a composable security framework. This
modeling of digital signatures potentially has some significant analytical advantages (such
as enabling component-wise analysis of complex systems that use signature schemes, as
well as symbolic and automatable analysis of such systems). However, it turns out that
formulating ideal functionalities that capture the properties expected from signature schemes …
Recently some efforts were made towards capturing the security requirements from digital signature schemes as an ideal functionality within a composable security framework. This modeling of digital signatures potentially has some significant analytical advantages (such as enabling component-wise analysis of complex systems that use signature schemes, as well as symbolic and automatable analysis of such systems). However, it turns out that formulating ideal functionalities that capture the properties expected from signature schemes in a way that is both sound and enjoys the above advantages is not a trivial task. This work has several contributions. We first correct some flaws in the definition of the ideal signature functionality of Canetti, 2001, and subsequent formulations. Next we provide a minimal formalization of "ideal certification authorities" and show how authenticated communication can be obtained using ideal signatures and an ideal certification authority. This is done while guaranteeing full modularity (i.e., each component is analyzed as stand-alone), and in an unconditional and errorless way. This opens the door to symbolic and automated analysis of protocols for these tasks, in a way that is both modular and cryptographically sound.
ieeexplore.ieee.org
Showing the best result for this search. See all results