Real Hidden Identity-Based Signatures
نویسندگان
چکیده
Group signature allows members to issue signatures on behalf of the group anonymously in normal circumstances. When the need arises, an opening authority (OA) can open a signature and reveal its true signer. Yet, many constructions require not only the OA’s secret key but also a member database (cf. a public-key repository) in this opening. This “secret members list” put the anonymity of members at risk. To resolve this “anonymity catch-22” issue, Kiayias and Zhou proposed hidden identity-based signatures (Financial Crypt. 2007), where the opening just takes in the OA’s secret key and outputs the signer identity. The membership list can be hidden from the OA since there is no membership list whatsoever. However, their constructions suffer from efficiency problem. This paper aims to realize the vision of Kiayias and Zhou for real, that is, an efficient construction which achieves the distinctive feature of hidden identity-based signatures. Moreover, our construction is secure against concurrent attack, and easily extensible with linkability such that any double authentication can be publicly detected. Both features are especially desirable in Internet-based services which allow anonymous authentication with revocation to block any misbehaving user. We believe our work will improve the usability of group signature and its variant.
منابع مشابه
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signatures. The motivation of our new signature primitive is to resolve an important issue with the kind of anonymity offered by “group signatures” where it is required that either the group membership list is public or that t...
متن کاملApplication of hidden Markov models for signature verification
-This paper describes a technique for on-line signature verification using Hidden Markov Models (HMMs). Signatures are captured and digitized in real-time using a graphic tablet. For each signature a HMM is constructed using a set of sample signatures described by the normalized directional angle function of the distance along the signature trajectory. The Baum-Welch algorithm is used for both ...
متن کاملOn-line Signature Verification on a Mobile Platform
This paper concerns the implementation of our online signature verification system on a mobile device. Verification involves confirming or denying a person‘s claimed identity. Our system is based on a Hidden Markov Model and outputs two complementary scores: the first one is related to the likelihood given by the HMM of the claimed identity; the second one is related to the segmentation given b...
متن کاملSignature Verification: A Comprehensive Study of the Hidden Signature Method
Many handwritten signature verification algorithms have been developed in order to distinguish between genuine signatures and forgeries. An important group of these methods is based on dynamic time warping (DTW). Traditional use of DTW for signature verification consists in forming a misalignment score between the verified signature and a set of template signatures. The right selection of templ...
متن کاملIdentity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official claimed that he was the anonymous source. Nevertheless, some are still inconvinced. In this paper, we introduce a new notion of identity-committable signatures (ICS) to ensure the anonymity of “Deep Throat” inside a group. A ...
متن کامل