Skip to main content

History-Based Signature or How to Trust Anonymous Documents

  • Conference paper
Trust Management (iTrust 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2995))

Included in the following conference series:

Abstract

This paper tackles the following problem: how to decide whether data are trustworthy when their originator wants to remain anonymous? More and more documents are available digitally and it is necessary to have information about their author in order to evaluate the accuracy of those data. Digital signatures and identity certificates are generally used for this purpose. However, trust is not always about identity. In addition authors often want to remain anonymous in order to protect their privacy. This makes common signature schemes unsuitable. We suggest an extension of group signatures where some anonymous person can sign a document as a friend of Alice, as a French citizen, or as someone that was in Paris in December, without revealing any identity. We refer to such scheme as history-based signatures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Tsudik, G.: Some open issues and new directions in group signatures. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 196–211. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Brands, S.: A technical Overview of Digital Credentials. Research Report (February 2002)

    Google Scholar 

  3. Bussard, L., Roudier, Y.: Embedding Distance-Bounding Protocols within Intuitive Interactions. In: Proceedings of Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany (March 2003)

    Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 93. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)

    Google Scholar 

  6. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. In: 23rd National Information Systems Security Conference (2000)

    Google Scholar 

  7. Dimmock, N.: How much is ’enough’? risk in trust-based access control. In: IEEE International Workshops on Enabling Technologies (Special Session on Trust Management) (June 2003)

    Google Scholar 

  8. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Rfc 2693 – spki certificate theory (1999)

    Google Scholar 

  9. Garfinkel, S.: PGP: Pretty Good Privacy. International Thomson Publishing (1995)

    Google Scholar 

  10. Ingram, D.: Trust-based filtering for augmented reality. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 108–122. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), June 2002, pp. 14–21 (2002)

    Google Scholar 

  12. Ramzan, Z.A.: Group blind digital signatures: Theory and applications, Master Thesis, MIT (1999)

    Google Scholar 

  13. Seigneur, J.M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end Trust Starts with Recognition. In: Proceedings of Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany (March 2003)

    Google Scholar 

  14. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2003 ACM workshop on Wireless security (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bussard, L., Molva, R., Roudier, Y. (2004). History-Based Signature or How to Trust Anonymous Documents. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24747-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21312-3

  • Online ISBN: 978-3-540-24747-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics