Anonymous Role-based Delegation With Group Signatures
نویسندگان
چکیده
We propose a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of his role without revealing his own identity. Anonymous delegation protects sensitive membership information of a delegator and hides the internal structure of an organization. Certificates used in anonymous role-based cascaded delegation model can be signed using any type of group signature scheme. However, in ubiquitous computing, users may have mobile computing devices with narrow communication bandwidth and small storage units. To make credentials efficient to store and transmit, we construct a group signature scheme that supports aggregation. We explain why an aggregate group signature scheme cannot be trivially obtained using existing aggregate signature scheme and one-time signing keys. Improvements in the credential size brought by using signature aggregation are compared with existing group signature schemes.
منابع مشابه
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal all delegators’ and the signer’s identity. The scheme satisfies a strong notion of non-frameability generalizing the on...
متن کاملCommuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Verifiable encryption allows to encrypt a signature and prove that the plaintext is valid. We introduce a new primitive called commuting signature that extends verifiable encryption in multiple ways: a signer can encrypt both signature and message and prove validity; more importantly, given a ciphertext, a signer can create a verifiably encrypted signature on the encrypted message; thus signing...
متن کاملA Credential-Based System for the Anonymous Delegation of Rights
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation mo...
متن کاملCredential-based systems for the anonymous delegation of rights
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation mo...
متن کاملA Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. acc...
متن کامل