Abstract
Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many authors. In this paper, the biometric-based, convertible, and undeniable multi-signature scheme is proposed. The private and public keys are generated using a signer’s biometric data and a random secret value. Thus, lending the private key to the proxy signer is not possible. All the signers should participate in multi-signature generation and verification stages. The proposed scheme also provides a signature conversion process in which undeniable multi-signature is converted to the ordinary one. We demonstrate how our scheme is useful to ensure multi-author copyrights and profits.
Similar content being viewed by others
References
Zeng W., Yu H., Lin C. Y. (2006) Multimedia Security Technologies for Digital Right Management. Elsevier, Amsterdam, pp 197–218
Elgamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4): 469–472
Chaum, D. (1990). “Undeniable signatures”, advances in cryptology. In Proceedings of CRYPTO’89 (pp. 212–216). Berlin: Springer.
Harn, L. (1993). (t,n) Threshold signature and digital multisignature. In Workshop on cryptography & data security (pp. 61–73).
Ratha N., Connell J., Bolle R. (2001) Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal 40(3): 614–634
Juels, A., & Sudan, M. A fuzzy vault scheme, http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf.
ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.
Janbandhu P., Siyal M. (2001) Novel biometric digital signatures for internet-based applications. Information Management & Computer Security 9(5): 205–212
Daugman, J. (1992). High confidence personal identifications by rapid video analysis of iris texture. In IEEE international carnahan conference on security technologies (pp. 50–60).
Daugman J. (1993) High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11): 648–656
Nagpal, R., & Nagpal, S. (May 2002). Biometric based Digital Signature Schemes, Internet Draft, http://www.ietf.org/internet-drafts/draft-nagpal-biometric-digital-signature-00.txt.
Orvos, P. (March 2002). Towards biometric digital signatures. In Networkshop (pp. 26–28). Eger: Eszterhazy College.
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometrics. Advances in Cryptology—EUROCRYPT 2005. In Lecture Notes in Computer Science 3494 (pp. 147–163). Berlin: Springer.
Tuyls, P. & Goseling, J. (2004). Capacity and examples of template-protecting biometric authentication systems. In Proceedings of BioAW 2004. Lecture Notes in Computer Science 3087 (pp. 158–170). Berlin: Springer.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. In Communications of the ACM 21(2).
FIPS PUB 186-3. (2009). Digital Signature Standard (DSS), NIST.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yun, S., Lim, H., Jeong, YS. et al. The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits. Wireless Pers Commun 60, 405–418 (2011). https://doi.org/10.1007/s11277-011-0298-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-011-0298-3