History-based signature or how to trust anonymous documents

被引:0
|
作者
Bussard, L [1 ]
Molva, R [1 ]
Roudier, Y [1 ]
机构
[1] Corp Commun, Inst Eurocom, F-06904 Sophia Antipolis, France
来源
TRUST MANAGEMENT, PROCEEDING | 2004年 / 2995卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper tackles the following problem: how to decide whether data are trustworthy when their originator wants to remain anonymous? More and more documents are available digitally and it is necessary to have information about their author in order to evaluate the accuracy of those data. Digital signatures and identity certificates are generally used for this purpose. However, trust is not always about identity. In addition authors often want to remain anonymous in order to protect their privacy. This makes common signature schemes unsuitable. We suggest an extension of group signatures where some anonymous person can sign a document as a friend of Alice, as a French citizen, or as someone that was in Paris in December, without revealing any identity. We refer to such scheme as history-based signatures.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [1] History-based trust negotiation model
    赵贻竹
    赵彦华
    鲁宏伟
    Journal of Shanghai University(English Edition), 2009, 13 (02) : 150 - 154
  • [2] History-based trust negotiation model
    赵贻竹
    赵彦华
    鲁宏伟
    Advances in Manufacturing, 2009, (02) : 150 - 154
  • [3] Personality Affects Dispositional Trust and History-Based Trust in Different Ways
    Liang, Jiawen
    Gao, Qi
    Li, Wenmin
    Shi, Yanwei
    Shen, Mowei
    Gao, Zaifeng
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2023, 39 (04) : 949 - 960
  • [4] A history-based framework to build trust management systems
    Galice, Samuel
    Legrand, Veronique
    Minier, Marine
    Mullins, John
    Ubda, Stephane
    2006 SECURECOMM AND WORKSHOPS, 2006, : 444 - +
  • [5] A system architecture for history-based access control for XML documents
    Roeder, Patrick
    Tafreschi, Omid
    Mellgren, Fredrik
    Eckert, Claudia
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 362 - 374
  • [6] On flexible Modeling of history-based access control policies for XML documents
    Roeder, Patrick
    Tafreschi, Omid
    Eckert, Claudia
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 1090 - +
  • [7] Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
    Feng, Wei
    Yan, Zheng
    Xie, Haomeng
    IEEE ACCESS, 2017, 5 : 6236 - 6246
  • [8] Not all trust is created equal: Dispositional and history-based trust in human-automation interactions
    Merritt, Stephanie M.
    Ilgen, Daniel R.
    HUMAN FACTORS, 2008, 50 (02) : 194 - 210
  • [9] History-Based Email Prioritization
    Nussbaum, Ronald
    Esfahanian, Abdol-Hossein
    Tan, Pang-Ning
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, 2009, : 364 - 365
  • [10] History-based Merging of Models
    Schmidt, Maik
    Wenzel, Sven
    Kehrer, Timo
    Kelter, Udo
    2009 ICSE WORKSHOP ON COMPARISON AND VERSIONING OF SOFTWARE MODELS, 2009, : 13 - 18