The Efficiency and Security of Pseudonymous Digital Signature for Modern e-Services
نویسندگان
چکیده
This paper presents a cryptanalysis of Pseudonymous Digital Signature(PDS) described in [8]. PDS proposed with respect to Pseudonymous Identification Scheme Intended to generate pseudonyms by trusted third party (usually the pseudonymity service provider) for registered users and organizations that provides on –line services. The results shows that the PDS very fast and highly secure with a comparison to RSA signature. Furthermore PDS offers a powerful mechanism to overcome the drawbacks that a pseudonymous credentials suffering to enable secure and flexible modern e-services.
منابع مشابه
Domain-Specific Pseudonymous Signatures Revisited
Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...
متن کاملPseudonymous signatures for eID: efficient and strongly secure dynamic domain-specific pseudonymous signatures
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for the private authentication of ID documents by Bender et al. at the ISC’12 conference. Thanks to this primitive, the ID document, which embeds a chip with computational abilities, is able to authenticate to a service provider through a reader, and the resulting signatures are anonymous, linkable inside ...
متن کاملModern Credential Access Control Approach Based On Pseudonymous Signature
This paper proposes a modern credential access control approach which allows the organizations to provide their resources/services on the internet and grant access rights to users by employing Cryptographic Pseudonymous Signature. The concepts of Modern Credentials and Pseudonymous Signature are proposed with respect to Pseudonymous Identification Scheme to facilitate pseudonymity in access con...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملCollusion-Resistant Domain-Specific Pseudonymous Signatures
At ISC 2012, Bender et al. introduced the notion of domainspecific pseudonymous signatures for ID documents. With this primitive, a user can sign with domain-specific pseudonyms, that cannot be linked across domains but that are linkable in a given domain. However, their security model assumes non-collusion of malicious users, which is a strong assumption. We therefore propose improvements to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008