Skip to main content

Bounded vector signatures and their applications

Publication ,  Conference
Wei, L; Coull, SE; Reiter, MK
Published in: Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
January 1, 2011

Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to obtain otherwise (e.g., homomorphic signatures). In this paper, we introduce a new malleable signature scheme called bounded vector signatures. The proposed scheme allows a user to sign a multi-dimensional vector of values, along with a description of the context within which the vector should be interpreted. The scheme includes a unique malleability property, which we refer to as the stretch property, that allows the components of the signed vector to be increased up to a pre-defined limit without access to the signing key. Decreasing these values, however, remains computationally infeasible. We prove the security of our construction under the strong RSA and decisional Diffie-Hellman assumptions in the random oracle model. Finally, we underscore the utility of bounded vector signatures by discussing their use in distributed systems security applications. Copyright 2011 ACM.

Duke Scholars

Published In

Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011

DOI

Publication Date

January 1, 2011

Start / End Page

277 / 285
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wei, L., Coull, S. E., & Reiter, M. K. (2011). Bounded vector signatures and their applications. In Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 (pp. 277–285). https://doi.org/10.1145/1966913.1966949
Wei, L., S. E. Coull, and M. K. Reiter. “Bounded vector signatures and their applications.” In Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 277–85, 2011. https://doi.org/10.1145/1966913.1966949.
Wei L, Coull SE, Reiter MK. Bounded vector signatures and their applications. In: Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. 2011. p. 277–85.
Wei, L., et al. “Bounded vector signatures and their applications.” Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, pp. 277–85. Scopus, doi:10.1145/1966913.1966949.
Wei L, Coull SE, Reiter MK. Bounded vector signatures and their applications. Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. 2011. p. 277–285.

Published In

Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011

DOI

Publication Date

January 1, 2011

Start / End Page

277 / 285