Skip to main content
Log in

The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many authors. In this paper, the biometric-based, convertible, and undeniable multi-signature scheme is proposed. The private and public keys are generated using a signer’s biometric data and a random secret value. Thus, lending the private key to the proxy signer is not possible. All the signers should participate in multi-signature generation and verification stages. The proposed scheme also provides a signature conversion process in which undeniable multi-signature is converted to the ordinary one. We demonstrate how our scheme is useful to ensure multi-author copyrights and profits.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Zeng W., Yu H., Lin C. Y. (2006) Multimedia Security Technologies for Digital Right Management. Elsevier, Amsterdam, pp 197–218

    Google Scholar 

  2. Elgamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4): 469–472

    Article  MathSciNet  Google Scholar 

  3. Chaum, D. (1990). “Undeniable signatures”, advances in cryptology. In Proceedings of CRYPTO’89 (pp. 212–216). Berlin: Springer.

  4. Harn, L. (1993). (t,n) Threshold signature and digital multisignature. In Workshop on cryptography & data security (pp. 61–73).

  5. Ratha N., Connell J., Bolle R. (2001) Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal 40(3): 614–634

    Article  Google Scholar 

  6. Juels, A., & Sudan, M. A fuzzy vault scheme, http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf.

  7. ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.

  8. Janbandhu P., Siyal M. (2001) Novel biometric digital signatures for internet-based applications. Information Management & Computer Security 9(5): 205–212

    Article  Google Scholar 

  9. Daugman, J. (1992). High confidence personal identifications by rapid video analysis of iris texture. In IEEE international carnahan conference on security technologies (pp. 50–60).

  10. Daugman J. (1993) High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11): 648–656

    Article  Google Scholar 

  11. Nagpal, R., & Nagpal, S. (May 2002). Biometric based Digital Signature Schemes, Internet Draft, http://www.ietf.org/internet-drafts/draft-nagpal-biometric-digital-signature-00.txt.

  12. Orvos, P. (March 2002). Towards biometric digital signatures. In Networkshop (pp. 26–28). Eger: Eszterhazy College.

  13. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometrics. Advances in Cryptology—EUROCRYPT 2005. In Lecture Notes in Computer Science 3494 (pp. 147–163). Berlin: Springer.

  14. Tuyls, P. & Goseling, J. (2004). Capacity and examples of template-protecting biometric authentication systems. In Proceedings of BioAW 2004. Lecture Notes in Computer Science 3087 (pp. 158–170). Berlin: Springer.

  15. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. In Communications of the ACM 21(2).

  16. FIPS PUB 186-3. (2009). Digital Signature Standard  (DSS), NIST.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heuiseok Lim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yun, S., Lim, H., Jeong, YS. et al. The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits. Wireless Pers Commun 60, 405–418 (2011). https://doi.org/10.1007/s11277-011-0298-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0298-3

Keywords

Navigation