Privacy protecting protocols for revokable digital signatures

István Zsolt Berta, L. Buttyán, István Vajda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted) terminal to authorize the card to produce digital signatures. In order to mitigate this problem, we proposed a solution based on conditional signatures to provide a framework for the repudiation of unintended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party.

Original languageEnglish
Title of host publicationIFIP Advances in Information and Communication Technology
PublisherSpringer New York LLC
Pages67-81
Number of pages15
Volume153
ISBN (Print)1402081464, 9781402081460
Publication statusPublished - 2004
EventIFIP TC8/WG8.8 and TC11/WG11.2 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004 - Toulouse, France
Duration: Aug 22 2004Aug 27 2004

Publication series

NameIFIP Advances in Information and Communication Technology
Volume153
ISSN (Print)18684238

Other

OtherIFIP TC8/WG8.8 and TC11/WG11.2 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004
CountryFrance
CityToulouse
Period8/22/048/27/04

Fingerprint

Digital signature
Privacy
Smart card
User interface
Disposal

ASJC Scopus subject areas

  • Information Systems and Management

Cite this

Berta, I. Z., Buttyán, L., & Vajda, I. (2004). Privacy protecting protocols for revokable digital signatures. In IFIP Advances in Information and Communication Technology (Vol. 153, pp. 67-81). (IFIP Advances in Information and Communication Technology; Vol. 153). Springer New York LLC.

Privacy protecting protocols for revokable digital signatures. / Berta, István Zsolt; Buttyán, L.; Vajda, István.

IFIP Advances in Information and Communication Technology. Vol. 153 Springer New York LLC, 2004. p. 67-81 (IFIP Advances in Information and Communication Technology; Vol. 153).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Berta, IZ, Buttyán, L & Vajda, I 2004, Privacy protecting protocols for revokable digital signatures. in IFIP Advances in Information and Communication Technology. vol. 153, IFIP Advances in Information and Communication Technology, vol. 153, Springer New York LLC, pp. 67-81, IFIP TC8/WG8.8 and TC11/WG11.2 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004, Toulouse, France, 8/22/04.
Berta IZ, Buttyán L, Vajda I. Privacy protecting protocols for revokable digital signatures. In IFIP Advances in Information and Communication Technology. Vol. 153. Springer New York LLC. 2004. p. 67-81. (IFIP Advances in Information and Communication Technology).
Berta, István Zsolt ; Buttyán, L. ; Vajda, István. / Privacy protecting protocols for revokable digital signatures. IFIP Advances in Information and Communication Technology. Vol. 153 Springer New York LLC, 2004. pp. 67-81 (IFIP Advances in Information and Communication Technology).
@inproceedings{bcbcab22e750483ba7c7598bb98fa0fc,
title = "Privacy protecting protocols for revokable digital signatures",
abstract = "Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted) terminal to authorize the card to produce digital signatures. In order to mitigate this problem, we proposed a solution based on conditional signatures to provide a framework for the repudiation of unintended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party.",
author = "Berta, {Istv{\'a}n Zsolt} and L. Butty{\'a}n and Istv{\'a}n Vajda",
year = "2004",
language = "English",
isbn = "1402081464",
volume = "153",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "67--81",
booktitle = "IFIP Advances in Information and Communication Technology",

}

TY - GEN

T1 - Privacy protecting protocols for revokable digital signatures

AU - Berta, István Zsolt

AU - Buttyán, L.

AU - Vajda, István

PY - 2004

Y1 - 2004

N2 - Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted) terminal to authorize the card to produce digital signatures. In order to mitigate this problem, we proposed a solution based on conditional signatures to provide a framework for the repudiation of unintended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party.

AB - Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted) terminal to authorize the card to produce digital signatures. In order to mitigate this problem, we proposed a solution based on conditional signatures to provide a framework for the repudiation of unintended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party.

UR - http://www.scopus.com/inward/record.url?scp=84902461449&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84902461449&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84902461449

SN - 1402081464

SN - 9781402081460

VL - 153

T3 - IFIP Advances in Information and Communication Technology

SP - 67

EP - 81

BT - IFIP Advances in Information and Communication Technology

PB - Springer New York LLC

ER -