Universally Composable Signature, Certification, and Authentication

  • Authors:
  • Ran Canetti

  • Affiliations:
  • IBM T.J. Watson Research Center

  • Venue:
  • CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently some efforts were made towards capturingthe security requirements from digital signature schemesas an ideal functionality within a composable securityframework.This modeling of digital signatures potentiallyhas some significant analytical advantages (suchas enabling component-wise analysis of complex systemsthat use signature schemes, as well as symbolic and automatableanalysis of such systems).However, it turnsout that formulating ideal functionalities that capture theproperties expected from signature schemes in a way thatis both sound and enjoys the above advantages is not atrivial task.This work has several contributions.We first correctsome flaws in the definition of the ideal signature functionalityof Canetti, 2001, and subsequent formulations.Next we provide a minimal formalization of "ideal certificationauthorities" and show how authenticated communicationcan be obtained using ideal signatures and anideal certification authority.This is done while guaranteeingfull modularity (i.e., each component is analyzed asstand-alone), and in an unconditional and errorless way.This opens the door to symbolic and automated analysisof protocols for these tasks, in a way that is both modularand cryptographically sound.