Universally composable signature, certification, and authentication

Ran Canetti*

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

168 Scopus citations

Abstract

Recently some efforts were made towards capturing the security requirements from digital signature schemes as an ideal functionality within a composable security framework. This modeling of digital signatures potentially has some significant analytical advantages (such as enabling component-wise analysis of complex systems that use signature schemes, as well as symbolic and automatable analysis of such systems). However, it turns out that formulating ideal functionalities that capture the properties expected from signature schemes in a way that is both sound and enjoys the above advantages is not a trivial task. This work has several contributions. We first correct some flaws in the definition of the ideal signature functionality of Canetti, 2001, and subsequent formulations. Next we provide a minimal formalization of "ideal certification authorities" and show how authenticated communication can be obtained using ideal signatures and an ideal certification authority. This is done while guaranteeing full modularity (i.e., each component is analyzed as stand-alone), and in an unconditional and errorless way. This opens the door to symbolic and automated analysis of protocols for these tasks, in a way that is both modular and cryptographically sound.

Original languageEnglish
Pages (from-to)219-233
Number of pages15
JournalProceedings of the Computer Security Foundations Workshop
Volume17
StatePublished - 2004
Externally publishedYes
EventProceedings - 17th IEEE Computer Security Foundations Workshop, CSFW 04 - Pacific Grove, CA, United States
Duration: 28 Jun 200430 Jun 2004

Fingerprint

Dive into the research topics of 'Universally composable signature, certification, and authentication'. Together they form a unique fingerprint.

Cite this