Abstract
This paper tackles the following problem: how to decide whether data are trustworthy when their originator wants to remain anonymous? More and more documents are available digitally and it is necessary to have information about their author in order to evaluate the accuracy of those data. Digital signatures and identity certificates are generally used for this purpose. However, trust is not always about identity. In addition authors often want to remain anonymous in order to protect their privacy. This makes common signature schemes unsuitable. We suggest an extension of group signatures where some anonymous person can sign a document as a friend of Alice, as a French citizen, or as someone that was in Paris in December, without revealing any identity. We refer to such scheme as history-based signatures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ateniese, G., Tsudik, G.: Some open issues and new directions in group signatures. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 196–211. Springer, Heidelberg (1999)
Brands, S.: A technical Overview of Digital Credentials. Research Report (February 2002)
Bussard, L., Roudier, Y.: Embedding Distance-Bounding Protocols within Intuitive Interactions. In: Proceedings of Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany (March 2003)
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 93. Springer, Heidelberg (2001)
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)
Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. In: 23rd National Information Systems Security Conference (2000)
Dimmock, N.: How much is ’enough’? risk in trust-based access control. In: IEEE International Workshops on Enabling Technologies (Special Session on Trust Management) (June 2003)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Rfc 2693 – spki certificate theory (1999)
Garfinkel, S.: PGP: Pretty Good Privacy. International Thomson Publishing (1995)
Ingram, D.: Trust-based filtering for augmented reality. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 108–122. Springer, Heidelberg (2003)
Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), June 2002, pp. 14–21 (2002)
Ramzan, Z.A.: Group blind digital signatures: Theory and applications, Master Thesis, MIT (1999)
Seigneur, J.M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end Trust Starts with Recognition. In: Proceedings of Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany (March 2003)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2003 ACM workshop on Wireless security (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bussard, L., Molva, R., Roudier, Y. (2004). History-Based Signature or How to Trust Anonymous Documents. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-24747-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21312-3
Online ISBN: 978-3-540-24747-0
eBook Packages: Springer Book Archive