Auflistung nach Autor:in "Brzuska, Christina"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragSanitizable signatures: how to partially delegate control for authenticated data(BIOSIG 2009: biometrics and electronic signatures, 2009) Brzuska, Christina; Fischlin, Marc; Lehmann, Anja; Schröder, DominiqueSanitizable signatures have been introduced by Ateniese et al. (ESORICS 2005) and allow an authorized party, the sanitizer, to modify a predetermined part of a signed message without invalidating the signature. Brzuska et al. (PKC 2009) gave the first comprehensive formal treatment of the five security properties for such schemes. These are unforgeability, immutability, privacy, transparency and accountability. They also provide a modification of the sanitizable signature scheme proposed by Ateniese et al. such that it provably satisfies all security requirement. Unfortunately, their scheme comes with rather large signature sizes and produces computational overhead that increases with the number of admissible modifications. In this paper we show that by sacrificing the transparency property - thus allowing to distinguish whether a message has been sanitized or notwe can obtain a sanitizable signature scheme that is still provably secure concerning the other aforementioned properties but significantly more efficient. We propose a construction that is based solely on regular signature schemes, produces short signatures and only adds a small computational overhead.
- KonferenzbeitragTLS, PACE, and EAC: a cryptographic view at modern key exchange protocols(SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit, 2012) Brzuska, Christina; Dagdelen, Özgür; Fischlin, MarcTo establish a secure channel between two parties common security solutions often use a key exchange protocol as a preliminary subroutine to generate a shared key. These solutions include the protocols for secure communication between a reader and an identity card or passport, called PACE and EAC, and the TLS protocol for secure web communication. In this work we survey the cryptographic status of these protocols and the recent developments in this area.