Collusion-Resistant Domain-Specific Pseudonymous Signatures
نویسندگان
چکیده
At ISC 2012, Bender et al. introduced the notion of domainspecific pseudonymous signatures for ID documents. With this primitive, a user can sign with domain-specific pseudonyms, that cannot be linked across domains but that are linkable in a given domain. However, their security model assumes non-collusion of malicious users, which is a strong assumption. We therefore propose improvements to their construction. Our main contribution is a new pseudonymous signature scheme based on group signatures that is collusion-resistant.
منابع مشابه
Domain-Specific Pseudonymous Signatures Revisited
Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...
متن کاملEfficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for private authentication of ID documents, like passports, that embed a chip with computational abilities. Thanks to this privacy-friendly primitive, the document authenticates to a service provider through a reader and the resulting signatures are anonymous, linkable inside the service and unlinkable acr...
متن کاملPseudonymous signatures for eID: efficient and strongly secure dynamic domain-specific pseudonymous signatures
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for the private authentication of ID documents by Bender et al. at the ISC’12 conference. Thanks to this primitive, the ID document, which embeds a chip with computational abilities, is able to authenticate to a service provider through a reader, and the resulting signatures are anonymous, linkable inside ...
متن کاملDomain-Specific Pseudonymous Signatures for the German Identity Card
The restricted identification protocol for the new German identity card basically provides a method to use pseudonyms such that they can be linked by individual service providers, but not across different service providers (even not malicious ones). The protocol can be augmented to allow also for signatures under the pseudonyms. In this paper, we thus view —and define— this idea more abstractly...
متن کاملA Family of Collusion Resistant Symmetric Key Protocols for Authentication
We address the problem of message authentication in communication networks which are resource constrained or are performance bound. Recent research has focused on development of symmetric key protocols for authentication in such networks. In these protocols, the sender generates a pool of keys -used to sign the messages, and distributes a different subset of keys -used to verify the signatures,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013