Paper 2004/052

The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures

Tal Malkin, Satoshi Obana, and Moti Yung

Abstract

For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexibility of signers within organizations and among entities). On the other hand, various notions of the key-evolving signature paradigms (forward-secure, key-insulated, and intrusion-resilient signatures) have been suggested in the last few years for protecting the security of signature schemes, localizing the damage of secret key exposure. In this work we relate the various notions via direct and concrete security reductions that are tight. We start by developing the first formal model for fully hierarchical proxy signatures, which, as we point out, also addresses vulnerabilities of previous schemes when self-delegation is used. Next, we prove that proxy signatures are, in fact, equivalent to key-insulated signatures. We then use this fact and other results to establish a tight hierarchy among the key-evolving notions, showing that intrusion-resilient signatures and key-insulated signatures are equivalent, and imply forward-secure signatures. We also introduce other relations among extended notions. Besides the importance of understanding the relationships among the various notions that were originally designed with different goals or with different system configuration in mind, our findings imply new designs of schemes. For example, many proxy signatures have been presented without formal model and proofs, whereas using our results we can employ the work on key-insulated schemes to suggest new provably secure designs of proxy signatures schemes.

Metadata
Available format(s)
PDF PS
Category
Foundations
Publication info
Published elsewhere. The extended abstract of the paper will be appeard in Eurocrypt 2004.
Keywords
Proxy SignaturesKey Evolving SignaturesSecurity HierarchyConcrete Reductions
Contact author(s)
satoshi @ cs columbia edu
History
2004-02-23: revised
2004-02-21: received
See all versions
Short URL
https://ia.cr/2004/052
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/052,
      author = {Tal Malkin and Satoshi Obana and Moti Yung},
      title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures},
      howpublished = {Cryptology ePrint Archive, Paper 2004/052},
      year = {2004},
      note = {\url{https://eprint.iacr.org/2004/052}},
      url = {https://eprint.iacr.org/2004/052}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.