Skip to main content

Traceability Schemes for Signed Documents*

  • Conference paper
  • First Online:
Information Security (ISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2433))

Included in the following conference series:

  • 789 Accesses

Abstract

Illegal distribution of signed documents can be considered as one of serious problems of digital signatures. In this paper, to solve the problem, we propose three protocols concerning signature schemes. These schemes achieve not only traceability of an illegal user but also universal verifiability. The first scheme is a basic scheme which can trace an illegal receiver, and the generation and tracing of a signed document are simple and efficient. However, in this scheme, it is assumed that a signer is honest. The second scheme gives another tracing method which does not always assume that a signer is honest. Furthermore, in the method, an illegal user can be traced by an authority itself, hence, it is efficient in terms of communication costs. However, in this scheme it is assumed that there exists only a legal verification algorithm. Thus, in general, this scheme cannot trace a modified signed document which is accepted by a modified verification algorithm. The third one is a scheme which requires no trusted signer and allows a modified verification algorithm. It can trace an illegal receiver or even a signer in such a situation. All of our schemes are constructed by simple combinations of standard signature schemes, consequently, one can flexibly choose suitable building blocks for satisfying requirements for a system.

The second author is supported by a research fellowship from Japan Society for the Promotion of Science (JSPS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe and J. Camenisch, “Partially Blind Signature Schemes,” In Proc. of the 1007 Symposium on Cryptography and Information Security (SCIS’97), Fukuoka, Japan, 1997.

    Google Scholar 

  2. M. Abe and E. Fujisaki, “How to Date Blind Signatures,” In Advances in Cryptology — ASIACRYPT’96, LNCS 1163, pp. 244–251, Springer-Verlag, 1996.

    Chapter  Google Scholar 

  3. M. Abe and T. Okamoto, “Provably Secure Partially Blind Signatures,” In Advances in Cryptology — CRYPTO 2000, LNCS 1880, pp. 271–286, Springer-Verlag, 2000.

    Chapter  Google Scholar 

  4. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, “A Practical and Provable Secure Coalition-Resistant Group Signature Scheme,” In Advances in Cryptology-CRYPTO2000, LNCS 1880, pp. 255–270, Springer-Verlag, 2000.

    Google Scholar 

  5. N. Asokan, V. Shoup and M. Waidner, “Optimistic Fair Exchange of Digital Signatures,” In Advances in Cryptology — EUROCRYPT’98, LNCS 1403, pp. 591–606, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  6. K. Baba, K. Iwamura, Y. Zheng and H. Imai, “A Protocol to Detect Who Has Leaked a Signed Document,” In Proc. of the 1999 Symposium on Cryptography and Information Security (SCIS’99), Kobe, Japan, pp. 257–262, 1999.

    Google Scholar 

  7. S. Brands, “Untraceable Off-line Cash in Wallets with Observers,” In Advances in Cryptology — CRYPTO’ 93, LNCS 773, pp. 302–318, Springer-Verlag, 1994.

    Chapter  Google Scholar 

  8. J. Camenisch and M. Stadler, “Efficient Group Signature Schemes for Large Groups,” In Advances in Cryptology — CRYPTO’97, LNCS 1296, pp. 410–424, Springer-Verlag, 1997.

    Chapter  Google Scholar 

  9. D. Chaum, “Zero-Knowledge Undeniable Signatures,” In Advances in Cryptology — EUROCRYPT’90, LNCS 473, pp. 458–464, Springer-Verlag, 1991.

    Google Scholar 

  10. D. Chaum, “Designated Confirmer Signatures,” In Advances in Cryptology — EUROCRYPT’94, LNCS 950, pp. 86–91, Springer-Verlag, 1994.

    Chapter  Google Scholar 

  11. D. Chaum and H. van Antwerpen, “Undeniable Signatures,” In Advances in Cryptology — CRYPTO’89, LNCS 435, pp. 212–216, Springer-Verlag, 1990.

    Google Scholar 

  12. D. Chaum and E. van Heyst, “Group Signatures,” In Advances in Cryptology — EUROCRYPT’91, LNCS 547, pp. 257–265, Springer-Verlag, 1991.

    Google Scholar 

  13. A. Fiat and A. Shamir, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems,” In Advances in Cryptology-CRYPTO’86, LNCS 263, pp. 186–194, Springer-Verlag, 1987.

    Chapter  Google Scholar 

  14. B. Pfitzmann and M. Waidner, “Anonymous Fingerprinting,” In Advances in Cryptology — EUROCRYPT’97, LNCS 1233, pp. 88–102, Springer-Verlag, 1997.

    Google Scholar 

  15. C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” In Advances in Cryptology — EUROCRYPT’89, LNCS 434, pp. 688–689, Springer-Verlag, 1990.

    Google Scholar 

  16. Y. Watanabe, Y. Zheng and H. Imai, “Traitor Traceable Signature Scheme,” In Proc. of ISIT2000, Sorrento, Italy, pp. 462, 2000.

    Google Scholar 

  17. Y. Watanabe, Y. Zheng and H. Imai, “Software Copyright Protection in the Presence of Corrupted Providers,” In Proc. of International Symposium on Information Theory and Its Applications(ISITA2000), Honolulu, Hawaii, U.S.A., pp. 501–504, 2000.

    Google Scholar 

  18. Y. Zheng, “Digital Signcryption or How to Achieve Cost(Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption),” In Advances in Cryptology-CRYPTO’97, LNCS 1294, pp. 165–179, Springer-Verlag, 1997.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yonezawa, S., Hanaoka, G., Shikata, J., Imai, H. (2002). Traceability Schemes for Signed Documents* . In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-45811-5_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44270-7

  • Online ISBN: 978-3-540-45811-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics