skip to main content
10.1145/1315245.1315280acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing

Published:28 October 2007Publication History

ABSTRACT

We construct new multiparty signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature simultaneously attesting to the message(s) they want to sign. First, we introduce a new primitive that we call ordered multisignatures (OMS), which allow signers to attest to a common message as well as the order in which they signed. Our OMS construction substantially improves computational efficiency over any existing scheme with comparable functionality. Second, we design a new identity-based sequential aggregate signature scheme, where signers can attest to different messages and signature verification does not require knowledge of traditional public keys. The latter property permits savings on bandwidth and storage as compared to public-key solutions. In contrast to the only prior scheme to provide this functionality, ours offers improved security that does not rely on synchronized clocks or a trusted first signer. Security proofs according to the corresponding security definitions and under appropriate computational assumptions are provided for all the proposed schemes. We give several applications of our schemes to secure network routing, and we believe that they will find many other applications as well.

References

  1. W. Aiello, J. Ioannidis, and P. McDaniel. Origin authentication in interdomain routing. In ACM CCS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M.-H. Au, W. Susilo, and Y. Mu. Practical compact e-cash. Cryptology ePrint Archive, Report 2007/148, 2007. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  3. M. Bellare and G. Neven. Multi-signatures in the plain public-key model and a general forking lemma. In ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bellare and G. Neven. Identity-based multi-signatures from RSA. In CT-RSA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In Symposium on Security and Privacy. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-Group signature scheme. In Public Key Cryptography, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Boldyreva, C. Gentry, A. O'Neill, and D. H. Yum. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. A full version of this paper, 2007. www.cc.gatech.edu/~aboldyre/publications.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Boneh and X. Boyen. Efficient selective-ID secure identity-based encryption without random oracles. In EUROCRYPT, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Burmester, Y. Desmedt, H. Doi, M. Mambo, E. Okamoto, M. Tada, and Y. Yoshifuji. A structured ElGamal-type multisignature scheme. In PKC, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Butler and W. Aiello. Optimizing BGP security by exploiting path stability. In ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Butler, F. Farley, P. McDaniel, and J. Rexford. A survey of BGP security. Apr. 2005. http://www.research.att.com/jrex/.Google ScholarGoogle Scholar
  16. J. Camenisch, S. Hohenberger, and M. Pedersen. Batch verification of short signatures. In EUROCRYPT, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  18. H. Chan, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure BGP protocols. In ACM SIGMETRICS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J.-S. Coron. On the exact security of full domain hash. In CRYPTO, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Doi, E. Okamoto, and M. Mambo. Multisignature schemes for various group structures. In Symposium on Cryptography and Information Security, 1994.Google ScholarGoogle Scholar
  21. H. Doi, E. Okamoto, M. Mambo, and T. Uyematsu. Multisignature scheme with specified order. In Conference on Communication, Control, and Computing, 1999.Google ScholarGoogle Scholar
  22. N. Feamster, H. Balakrishnan, and J. Rexford. Some foundational problems in interdomain routing. In HotNets, 2004.Google ScholarGoogle Scholar
  23. D. Galindo, J. Herranz, and E. Kiltz. On the generic construction of identity-based signatures with additional properties. In ASIACRYPT, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Gentry and Z. Ramzan. Identity-based aggregate signatures. In Public Key Cryptography, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. Mcdanniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In NDSS, 2003.Google ScholarGoogle Scholar
  27. J. Herranz. Deterministic identity-based signatures for partial aggregation. J. Comput., 49(3), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In ACM SIGCOMM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure border gateway protocol (S-BGP) - Real world performance and deployment issues. In NDSS, 2000.Google ScholarGoogle Scholar
  30. E. Kiltz, A. Mityagin, S. Panjwani, and B. Raghavan. Append-only signatures. In ICALP, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters. Sequential aggregate signatures and multisignatures without random oracles. In EUROCRYPT, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham. Sequential aggregate signatures from trapdoor permutations. In EUROCRYPT, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  33. A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In Selected Areas in Cryptography, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. Micali, K. Ohta, and L. Reyzin. Accountable-subgroup multisignatures. In ACM CCS, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Mitomi and A. Miyaji. A multisignature scheme with message flexibility, order flexibility and order verifiability. In ACISP, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. Motiwala, A. Bavier, and N. Feamster. In-band network path diagnosis. Georgia Tech Technical Report GT-CS-07-07.Google ScholarGoogle Scholar
  37. M. Motiwala and N. Feamster. Position paper: Network troubleshooting on data plane coattails. In WIRED, 2006.Google ScholarGoogle Scholar
  38. E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In ESORICS, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  39. A. Saxena and B. Soh. One-way signature chaining - a new paradigm for group cryptosystems. Cryptology ePrint Archive, Report 2005/335, 2005. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  40. V. Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. K. Stange. The tate pairing via elliptic nets. In Pairing 2007, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. M. Tada. An order-specified multisignature scheme secure against active insider attacks. In Australian Conference on Information Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. T. Wan, E. Kranakis, and P. van Oorschot. Pretty secure BGP, psBGP. In NDSS, 2005.Google ScholarGoogle Scholar
  44. S. Xu and Y. and W. Susilo. Online/offline signatures and multisignatures for AODV and DSR routing security. In Australasian Conference on Information Security and Privacy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. M. Zhao, S. Smith, and D. Nicol. Aggregated path authentication for efficient BGP security. In ACM CCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
      October 2007
      628 pages
      ISBN:9781595937032
      DOI:10.1145/1315245

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 October 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      CCS '07 Paper Acceptance Rate55of302submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader