Skip to main content

Signing on a Postcard

  • Conference paper
  • First Online:
Financial Cryptography (FC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1962))

Included in the following conference series:

Abstract

We investigate the problem of signing short messages using a scheme that minimizes the total length of the original message and the appended signature. This line of research was motivated by several postal services interested by stamping machines capable of producing digital signatures. Although several message recovery schemes exist, their security is questionable. This paper proposes variants of DSA and ECDSA allowing partial recovery: the signature is appended to a truncated message and the discarded bytes are recovered by the verification algorithm. Still, the signature authenticates the whole message. Our scheme has some form of provable security, based on the random oracle model. Using further optimizations we can lower the scheme’s overhead to 26 bytes for a 2-80 security level, compared to forty bytes for DSA or ECDSA and 128 bytes 1024-bit RSA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe and T. Okamoto, A signature scheme with message recovery as secure as discrete logarrithms, Proceedings of asiacrypt’99, LNCS, Springer-Verlag, to appear, 1999.

    Google Scholar 

  2. M. Bcllarc and P. Rogaway, Random oracles arc practical: a paradigm for designing efficient protocols, Proceedings of the 1-st ACM conference on communications and computer security, pp. 62–73. 1993.

    Google Scholar 

  3. M. Bellare and P. Rogaway, The exact security of digital signatures-How-to sign with RSA and Rabin, Proceedings of eurocrypt’96, LNCS 950, Springer-Verlag, pp. 399–416, 1996.

    MATH  Google Scholar 

  4. D. Coppersmith, S. Halevi and C. Jutla, ISO 9796-1 and the new forgery strategy., manuscript, July 28, 1999.

    Google Scholar 

  5. J.-S. Coron. D. Naccache and, T.P. Stern, On the security of RSA padding, Proceedings of crypto’99, LNCS 1666, Springer-Vcrlag, pp. 1–18, 1999.

    Google Scholar 

  6. IEEE P1363 Draft, Standard specifications for public key cryptography, (available from http://grouper.ieee.org/groups/1363/index.html), 1998.

  7. ISO/IEC 9796-2, Information technology, Security techniques, Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-function, 1997.

    Google Scholar 

  8. V.I. Nechaev, Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2), pp. 165–172, 1994. Translated from Matematicheskie Zametki 55(2), pp. 91-101, 1994.

    MATH  Google Scholar 

  9. National Institute of Standards and Technology, Secure hash standard, FIPS publication 180-1, April 1994.

    Google Scholar 

  10. K. Nyberg and R. Rueppel, A new signature scheme based on the DSA, giving message recovery, Proceedings of the 1-st ACM conference on communications and computer security, pp. 58–61, 1993.

    Google Scholar 

  11. D. Pointcheval and J. Stern, Security proofs for signature schemes. Proceedings of euhochypt’96, LNCS 950, Springer-Verlag, pp. 387–398, 1996.

    Google Scholar 

  12. V. Shoup, Lower bounds for discrete logarithms and related problems. Proceedings of eurocrypt’97, LNCS 1233, Springer-Verlag, pp. 256–266, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naccache, D., Stern, J. (2001). Signing on a Postcard. In: Frankel, Y. (eds) Financial Cryptography. FC 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45472-1_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45472-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42700-1

  • Online ISBN: 978-3-540-45472-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics