Real Hidden Identity-Based Signatures

نویسندگان

  • Sherman S. M. Chow
  • Haibin Zhang
  • Tao Zhang
چکیده

Group signature allows members to issue signatures on behalf of the group anonymously in normal circumstances. When the need arises, an opening authority (OA) can open a signature and reveal its true signer. Yet, many constructions require not only the OA’s secret key but also a member database (cf. a public-key repository) in this opening. This “secret members list” put the anonymity of members at risk. To resolve this “anonymity catch-22” issue, Kiayias and Zhou proposed hidden identity-based signatures (Financial Crypt. 2007), where the opening just takes in the OA’s secret key and outputs the signer identity. The membership list can be hidden from the OA since there is no membership list whatsoever. However, their constructions suffer from efficiency problem. This paper aims to realize the vision of Kiayias and Zhou for real, that is, an efficient construction which achieves the distinctive feature of hidden identity-based signatures. Moreover, our construction is secure against concurrent attack, and easily extensible with linkability such that any double authentication can be publicly detected. Both features are especially desirable in Internet-based services which allow anonymous authentication with revocation to block any misbehaving user. We believe our work will improve the usability of group signature and its variant.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hidden Identity-Based Signatures

This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signatures. The motivation of our new signature primitive is to resolve an important issue with the kind of anonymity offered by “group signatures” where it is required that either the group membership list is public or that t...

متن کامل

Application of hidden Markov models for signature verification

-This paper describes a technique for on-line signature verification using Hidden Markov Models (HMMs). Signatures are captured and digitized in real-time using a graphic tablet. For each signature a HMM is constructed using a set of sample signatures described by the normalized directional angle function of the distance along the signature trajectory. The Baum-Welch algorithm is used for both ...

متن کامل

On-line Signature Verification on a Mobile Platform

This paper concerns the implementation of our online signature verification system on a mobile device. Verification involves confirming or denying a person‘s claimed identity. Our system is based on a Hidden Markov Model and outputs two complementary scores: the first one is related to the likelihood given by the HMM of the claimed identity; the second one is related to the segmentation given b...

متن کامل

Signature Verification: A Comprehensive Study of the Hidden Signature Method

Many handwritten signature verification algorithms have been developed in order to distinguish between genuine signatures and forgeries. An important group of these methods is based on dynamic time warping (DTW). Traditional use of DTW for signature verification consists in forming a misalignment score between the verified signature and a set of template signatures. The right selection of templ...

متن کامل

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures

The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official claimed that he was the anonymous source. Nevertheless, some are still inconvinced. In this paper, we introduce a new notion of identity-committable signatures (ICS) to ensure the anonymity of “Deep Throat” inside a group. A ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017