Skip to main content

Fail-Stop Signature

  • Reference work entry
  • 225 Accesses

Fail-stop signatures are digital signatures where signers enjoy unconditional unforgeability (with an unavoidable but negligible error probability), while the verifiers bear the risk of forged signatures, and therefore enjoy computational security only. If a signer is confronted with an alleged signature that she has not produced, then the signer can with overwhelming probability prove that the alleged signature is in fact forged. Afterwards, the signer can revoke her verifying key, thus the name fail-stop signature scheme. Fail-stop signatures were introduced by Pfitzmann [4] who gives an in-depth introduction in [6]. The security for the signer is strictly stronger than the strongest security defined by Goldwasser, Micali, and Rivest (see GMR signatures [2]), where signers enjoy computational security while verifiers are unconditionally secure against forgery. In other words, the signer is secure even against counterfeiting by a computationally unrestricted attacker. In the same...

This is a preview of subscription content, log in via an institution.

References

  1. Chaum, David, Eugéne van Heijst, and Birgit Pfitzmann (1992). “Cryptographically strong undeniable signatures, unconditionally secure for the signer.” Advances in Cryptology—CRYPTO'91, Lecture Notes in Computer Science, vol. 576, ed. J. Feigenbaum. Springer-Verlag, Berlin, 470–484.

    Google Scholar 

  2. Goldwasser, Shafi, Silvio Micali, and Ronald L. Rivest (1988). “A digital signature scheme secure against adaptive chosen-message attacks.” SIAM Journal on Computing, 17 (2), 281–308.

    Article  MATH  MathSciNet  Google Scholar 

  3. Pedersen, Torben P. and Birgit Pfitzmann (1997). “Fail-stop signatures.” SIAM Journal on Computing, 26 (2), 291–330.

    Article  MATH  MathSciNet  Google Scholar 

  4. Pfitzmann, Birgit (1991). “Fail-stop signatures; principles and applications.” Proc. COMPSEC'91, 8th World Conference on Computer Security, Audit and Control. Elsevier, Oxford, 125–134.

    Google Scholar 

  5. Pfitzmann, Birgit (1993). “Sorting out signature schemes.” 1st ACM Conference on Computer and Communications Security, Fairfax, November 1993. ACM Press, New York, 74–85.

    Chapter  Google Scholar 

  6. Pfitzmann, Birgit (1996). “Digital signature schemes general framework and fail-stop signatures.” Lecture Notes in Computer Science, vol. 1100, ed. B. Pfitzmann. Springer-Verlag, Berlin.

    Google Scholar 

  7. Susilo, Willy, Reihaneh Safavi-Naini, and Josef Pieprzyk (1999). “RSA-based fail-stop signature schemes.” International Workshop on Security (IWSEC'99). IEEE Computer Society Press, Los Alamitos, CA, 161–166.

    Google Scholar 

  8. Susilo, Willy, Rei Safavi-Naini, and Josef Pieprzyk (1999). “Fail-stop threshold signature schemes based on elliptic curves.” Information Security and Privacy, Lecture Notes in Computer Science, vol. 1587, eds. J. Pieprzyk, R. Safari-Naini, and J. Seberry. Springer-Verlag, Berlin, 103–116.

    Google Scholar 

  9. Susilo, Willy, Reihaneh Safavi-Naini, Marc Gysin, and Jennifer Seberry (2000). “A new and efficient fail-stop signature scheme.” The Computer Journal, 43 (5), 430–437.

    Article  Google Scholar 

  10. van Heijst, Eugéne and Torben P. Pedersen (1993). “How to make efficient fail-stop signatures.” Advances in Cryptology—EUROCRYPT'92, Lecture Notes in Computer Science, vol. 658, ed. R.A. Rueppel. Springer-Verlag, Berlin, 366–377.

    Google Scholar 

  11. van Heijst, Eugéne, Torben P. Pedersen, and Birgit Pfitzmann (1993). “New constructions of fail-stop signatures and lower bounds.” Advances in Cryptology—CRYPTO'92, Lecture Notes in Computer Science, vol. 740, ed. E.F. Brickell. Springer-Verlag, Berlin, 15–30.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Bleumer, G. (2005). Fail-Stop Signature. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_154

Download citation

Publish with us

Policies and ethics