Re: Recipient-verifiable messages

Jon Callas <jon@callas.org> Fri, 12 April 2002 00:47 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA22059 for <openpgp-archive@odin.ietf.org>; Thu, 11 Apr 2002 20:47:46 -0400 (EDT)
Received: by above.proper.com (8.11.6/8.11.3) id g3C0cGu29418 for ietf-openpgp-bks; Thu, 11 Apr 2002 17:38:16 -0700 (PDT)
Received: from merrymeet.com (merrymeet.com [63.73.97.162]) by above.proper.com (8.11.6/8.11.3) with ESMTP id g3C0cEm29413 for <ietf-openpgp@imc.org>; Thu, 11 Apr 2002 17:38:14 -0700 (PDT)
Received: from [192.168.1.97] (63.84.37.127) by merrymeet.com with ESMTP (Eudora Internet Mail Server 3.1.1); Thu, 11 Apr 2002 17:38:05 -0700
Mime-Version: 1.0
Message-Id: <p0510153fb8dbd86e1539@[192.168.1.97]>
In-Reply-To: <200204120005.g3C05VL13758@stingray.missi.ncsc.mil>
References: <200204111545.g3BFjdw11622@finney.org> <p0510153cb8dbc0a982fc@[192.168.1.97]> <200204120005.g3C05VL13758@stingray.missi.ncsc.mil>
Date: Thu, 11 Apr 2002 17:29:42 -0700
To: "David P. Kemp" <dpkemp@missi.ncsc.mil>
From: Jon Callas <jon@callas.org>
Subject: Re: Recipient-verifiable messages
Cc: ietf-openpgp@imc.org
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

At 8:06 PM -0400 4/11/02, David P. Kemp wrote:

>What is the difference between a "recipient-verifiable signature" and
>a MAC?
>
>One of the properties of a digital signature mechanism is that it
>is computationally infeasible for any entity other than the signer
>to find, for any message, a signature value that is valid for that
>message.  [HAC, p.23]
>
>Thus it would seem that a "signature" that can't be bound later
>to the signer is an oxymoron.  Why not just call it an authentication
>code, where it is accepted that anyone who can verify a MAC has
>the information necessary to create it.

The obvious difference is this:

If the shared secret (shared by, say, Alice and Bob) used to generate a MAC
is leaked -- suppose Charlie learns it -- then anyone, Alice, Bob, or
Charlie can rewrite the MAC undetectably.

On the other hand if Alice generates one of these signatures and sends it
to Bob, a third party, Teresa can verify the signature but:

 * not be able to create one of her own and
 * cannot tell from the signature itself whether Alice or Bob made it.

I'm not sure how useful it is in the real world, but it's a fascinating thing.

I could sign a message to this list combining a dozen keys and thus create
a presumption that I made it without explicit demonstration of it.

	Jon