A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Multi-designated verifiers signatures: anonymity without encryption
Information Processing Letters
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Electronic Notes in Theoretical Computer Science (ENTCS)
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient ring signatures without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the security models of (threshold) ring signature schemes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
On delegatability of four designated verifier signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Universal designated verifier signatures without random oracles or non-black box assumptions
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Proof-carrying proxy certificates
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Ring signatures: stronger definitions, and constructions without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
Hi-index | 0.00 |
In this paper, we present a new cryptographic primitive called “policy-controlled signature”. In this primitive, a signer can sign a message and attach some policies to it. Only a verifier who satisfies the policies attached can verify the authenticity of the message. This type of signature schemes has many applications, in particular to deal with sensitive data, where the signer does not want to allow anyone who is not authorized to verify its authenticity. Nonetheless, there is no existing cryptographic primitives that can offer this feature in the literature. Policy-controlled signatures can be seen to be similar to the notion of designated verifier signatures, as it can also be used to designate a signature to multiple recipients. When there is only a single attribute involved in a policy presented by a verifier, then we will achieve a designated verifier signature (with some trivial modifications). Therefore, policy-controlled signatures can be viewed as the generalization of the notion of the designated verifier signatures. We present a formal model to capture this notion. Furthermore, we also present a concrete scheme that is secure in our model. Finally, we briefly mention about an implementation that incorporates P3P to realize policy-controlled signatures.