Collusion-Resistant Domain-Specific Pseudonymous Signatures

  • Julien Bringer
  • Hervé Chabanne
  • Alain Patey
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

At ISC 2012, Bender et al.introduced the notion of domain-specific pseudonymous signatures for ID documents. With this primitive, a user can sign with domain-specific pseudonyms, that cannot be linked across domains but that are linkable in a given domain. However, their security model assumes non-collusion of malicious users, which is a strong assumption. We therefore propose improvements to their construction. Our main contribution is a new pseudonymous signature scheme based on group signatures that is collusion-resistant.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Advanced security mechanisms for machine readable travel documents. part 2 extended access control version 2 (EACv2), password authenticated connection establishment (PACE), and restricted identification (RI). Tech. Rep. TR-03110-2, BSI, version 2.10 (March 2012)Google Scholar
  2. 2.
    Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. IACR Cryptology ePrint Archive 2004,  77 (2004)Google Scholar
  3. 3.
    Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: Domain-specific pseudonymous signatures for the german identity card. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 104–119. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Bringer, J., Chabanne, H., Patey, A.: Collusion-resistant domain-specific pseudonymous signatures. IACR Cryptology ePrint Archive, http://eprint.iacr.org/2013/182
  6. 6.
    Bringer, J., Patey, A.: VLR group signatures - how to achieve both backward unlinkability and efficient revocation checks. In: SECRYPT, pp. 215–220 (2012)Google Scholar
  7. 7.
    Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  8. 8.
    Chen, L., Li, J.: VLR group signatures with indisputable exculpability and efficient revocation. In: Elmagarmid, A.K., Agrawal, D. (eds.) SocialCom/PASSAT, pp. 727–734. IEEE Computer Society (2010)Google Scholar
  9. 9.
    Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  10. 10.
    Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Julien Bringer
    • 1
  • Hervé Chabanne
    • 1
    • 2
  • Alain Patey
    • 1
    • 2
  1. 1.MorphoFrance
  2. 2.Identity and Security Alliance (The Morpho and Télécom ParisTech Research Center)Télécom ParisTechFrance

Personalised recommendations