Skip to main content
placeholder image

Policy-controlled signatures and their applications

Journal Article


Abstract


  • In this paper, we present a new cryptographic primitive called “policy-controlled signatures”. In this notion, a

    signer can sign a message and attach it with some policies. Only a verifier who satisfies the policies attached can

    verify the authenticity of the message. This type of signature schemes has many applications, in particular to

    deal with sensitive data, where the signer does not want to allow anyone who is unauthorized to verify the

    authenticity of the messages. The notion of policy-controlled signatures resembles some similarities with

    designated verifier signatures, as it can also be used to designate a signature to multiple recipients.

    Nevertheless, we shall demonstrate that the notion of policy-controlled signatures generalize the notion of

    designated verifier signatures. A concrete scheme that is secure in our model is also provided. Furthermore, we

    also present an extension to “universal policy-controlled signature”. In this extended notion, we combine the

    idea of universal designated verifier signatures with policy-controlled signatures to allow more flexible

    delegations. We also provide a concrete scheme that is secure in our model.

Publication Date


  • 2017

Citation


  • Thorncharoensri, P., Susilo, W. & Mu, Y. (2017). Policy-controlled signatures and their applications. Computer Standards and Interfaces, 50 26-41.

Scopus Eid


  • 2-s2.0-84990903108

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/6496

Number Of Pages


  • 15

Start Page


  • 26

End Page


  • 41

Volume


  • 50

Place Of Publication


  • Netherlands

Abstract


  • In this paper, we present a new cryptographic primitive called “policy-controlled signatures”. In this notion, a

    signer can sign a message and attach it with some policies. Only a verifier who satisfies the policies attached can

    verify the authenticity of the message. This type of signature schemes has many applications, in particular to

    deal with sensitive data, where the signer does not want to allow anyone who is unauthorized to verify the

    authenticity of the messages. The notion of policy-controlled signatures resembles some similarities with

    designated verifier signatures, as it can also be used to designate a signature to multiple recipients.

    Nevertheless, we shall demonstrate that the notion of policy-controlled signatures generalize the notion of

    designated verifier signatures. A concrete scheme that is secure in our model is also provided. Furthermore, we

    also present an extension to “universal policy-controlled signature”. In this extended notion, we combine the

    idea of universal designated verifier signatures with policy-controlled signatures to allow more flexible

    delegations. We also provide a concrete scheme that is secure in our model.

Publication Date


  • 2017

Citation


  • Thorncharoensri, P., Susilo, W. & Mu, Y. (2017). Policy-controlled signatures and their applications. Computer Standards and Interfaces, 50 26-41.

Scopus Eid


  • 2-s2.0-84990903108

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/6496

Number Of Pages


  • 15

Start Page


  • 26

End Page


  • 41

Volume


  • 50

Place Of Publication


  • Netherlands