Differential properties of elliptic curves and blind signatures

Billy Bob Brumley, Kaisa Nyberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

3 Citations (Scopus)

Abstract

Differential uniformity is an important property of cryptographic building blocks used in the design of symmetric ciphers. In this paper it is proved that certain canonical mappings on elliptic curves are differentially uniform. The main observation of this paper is that the impersonation attack against the implicit certificate scheme of Ateniese and de Medeiros does not work if a differentially uniform mapping is used in the scheme. This phenomenon is analyzed in the slightly more general context of a partially blind signature scheme, which is a new cryptographic primitive that seems to gain security properties from differentially uniform mappings.

Original languageEnglish
Title of host publicationInformation Security - 10th International Conference, ISC 2007, Proceedings
Pages376-389
Number of pages14
Publication statusPublished - 1 Dec 2007
Externally publishedYes
Publication typeA4 Article in conference proceedings
Event10th Information Security Conference, ISC 2007 - Valparaiso, Chile
Duration: 9 Oct 200712 Oct 2007

Publication series

NameLecture Notes in Computer Science
Volume4779
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th Information Security Conference, ISC 2007
Country/TerritoryChile
CityValparaiso
Period9/10/0712/10/07

Keywords

  • Blind signatures
  • Differential uniformity
  • Digital signature schemes
  • Elliptic curves
  • Implicit public key certificates
  • Key issuing protocols
  • Message recovery
  • Provable security

Publication forum classification

  • Publication forum level 1

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Differential properties of elliptic curves and blind signatures'. Together they form a unique fingerprint.

Cite this