The Community for Technology Leaders
Dependable, Autonomic and Secure Computing, IEEE International Symposium on (2006)
Indiana University-Purdue University, Indianapolis, USA
Sept. 29, 2006 to Oct. 1, 2006
ISBN: 0-7695-2539-3
pp: 37-44
We introduce the notion of tamper-evidence for digital signature generation in order to defend against attacks aimed at covertly leaking secret information held by corrupted signing nodes. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. We call our signature schemes tamper-evident since any deviation from the protocol is immediately detectable. We demonstrate our technique for the RSA-PSS (known as RSA's probabilistic signature scheme) and DSA signature schemes and show how the same technique can be applied to the Schnorr and Feige-Fiat-Shamir (FFS) signature schemes. Our technique does not modify the distribution of the generated signature transcripts, and has only a minimal overhead in terms of computation, communication, and storage
Digital signatures, Protection, Certification, Public key, Cryptography, Computer science, Informatics, Protocols, Distributed computing, Concatenated codes
"Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware", Dependable, Autonomic and Secure Computing, IEEE International Symposium on, vol. 00, no. , pp. 37-44, 2006, doi:10.1109/DASC.2006.46
98 ms
(Ver 3.3 (11022016))