Multi-Level Controlled Signature

نویسندگان

  • Pairat Thorncharoensri
  • Willy Susilo
  • Yi Mu
چکیده

In this work, we present and establish a new primitive called Multi-level Controlled Signature. This primitive allows a signer to specify a security level to limit the verifiability of the signature. This primitive works as follows. Without losing generality, we assume the security levels of a group of users are defined in ascending order, where “A” represents the lowest security level and “Z” represents the highest security level, respectively. When a signer signs a message by specifying a security level “C”, all users who have a security level greater than “C” will be able to verify while other users whose security levels are “A”, “B” or “C” cannot verify the authenticity of this message. This primitive resembles some similarities with other existing primitives, such as Hierarchical Identitybased Encryption/Signatures, policy-based cryptography, but we stress that this primitive is unique in the sense that other primitives cannot satisfy all requirements as stated above efficiently. In this paper, we develop a security model for such a primitive. We present two concrete constructions that are proven secure in our model. The first scheme has a constant signature size, while the second scheme is more efficient in terms of verifier’s private information. We provide a comparison between our schemes and illustrate where each scheme is applicable in the real world scenario.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

Quantum Multi-Signature Protocol Based on Teleportation

In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum c...

متن کامل

Multi-Level Reliable Data Aggregation in Wireless Sensor Network

Data aggregation is a key challenging task in wireless senor network to reduce energy consumption and ensures the data reliability and security. Multi-level data aggregation techniques ensure security and reliability of data aggregation in the presence of secure routing. Every movement of data must be followed by secure routing via the dynamically distributed secure node list to ensure the secu...

متن کامل

Reducing the Limitation on Application of Synchronous Decorrelating Detector Cdma Systems

In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...

متن کامل

A Signature Access Method for the Starburst Database System

This paper describes a new signature generation method for constructing multi-level signature files to support both relational queries which contain multiple conjunctive (AND) predicates and generic document text queries. We describe the major problems with traditional multi-level signature files and then describe how to build multi-level signature files using a new composite method of parent s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012