Malleable Signatures for Resource Constrained Platforms - Information Security Theory and Practice: Security of Mobile and Cyber-Physical Systems Access content directly
Conference Papers Year : 2013

Malleable Signatures for Resource Constrained Platforms

Henrich C. Pöhls
  • Function : Author
  • PersonId : 1001640
Stefan Peters
  • Function : Author
  • PersonId : 1003786
Kai Samelin
  • Function : Author
  • PersonId : 1003787
Joachim Posegga
  • Function : Author
  • PersonId : 1003788
Hermann De Meer
  • Function : Author
  • PersonId : 979976


Malleable signatures allow the signer to control alterations to a signed document. The signer limits alterations to certain parties and to certain parts defined during signature generation. Admissible alterations do not invalidate the signature and do not involve the signer. These properties make them a versatile tool for several application domains, like e-business and health care. We implemented one secure redactable and three secure sanitizable signature schemes on secure, but computationally bounded, smart card. This allows for a secure and practically usable key management and meets legal standards of EU legislation. To gain speed we securely divided the computing tasks between the powerful host and the card; and we devise a new accumulator to yield a useable redactable scheme. The performance analysis of the four schemes shows only a small performance hit by the use of an off-the-shelf card.
Fichier principal
Vignette du fichier
978-3-642-38530-8_2_Chapter.pdf (422.14 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01485931 , version 1 (09-03-2017)





Henrich C. Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann De Meer. Malleable Signatures for Resource Constrained Platforms. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩. ⟨hal-01485931⟩
159 View
91 Download



Gmail Facebook X LinkedIn More