Paper 2009/027
Security of Verifiably Encrypted Signatures
Markus Rückert and Dominique Schröder
Abstract
In a verifiably encrypted signature scheme, signers encrypt their signature under the public key of a trusted third party and prove that they did so correctly. The security properties are unforgeability and opacity. Unforgeability states that a malicious signer should not be able to forge verifiably encrypted signatures and opacity prevents extraction from an encrypted signature. This paper proposes two novel fundamental requirements for verifiably encrypted signatures, called \emph{extractability} and \emph{abuse-freeness}, and analyze its effects on the security model of Boneh et al. Extractability ensures that the trusted third party is always able to extract a valid signature from a valid verifiably encrypted signature and abuse-freeness guarantees that a malicious signer, who cooperates with the trusted party, is not able to forge a verifiably encrypted signature. We further show that both properties are not covered by the model of Boneh et al., introduced at Eurocrypt 2003.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Verifiably encrypted signaturesOnline contract signingSecurity Model
- Contact author(s)
- schroeder @ me com
- History
- 2009-02-22: revised
- 2009-01-14: received
- See all versions
- Short URL
- https://ia.cr/2009/027
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/027, author = {Markus Rückert and Dominique Schröder}, title = {Security of Verifiably Encrypted Signatures}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/027}, year = {2009}, url = {https://eprint.iacr.org/2009/027} }