History-based signature or how to trust anonymous documents

被引:0
|
作者
Bussard, L [1 ]
Molva, R [1 ]
Roudier, Y [1 ]
机构
[1] Corp Commun, Inst Eurocom, F-06904 Sophia Antipolis, France
来源
TRUST MANAGEMENT, PROCEEDING | 2004年 / 2995卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper tackles the following problem: how to decide whether data are trustworthy when their originator wants to remain anonymous? More and more documents are available digitally and it is necessary to have information about their author in order to evaluate the accuracy of those data. Digital signatures and identity certificates are generally used for this purpose. However, trust is not always about identity. In addition authors often want to remain anonymous in order to protect their privacy. This makes common signature schemes unsuitable. We suggest an extension of group signatures where some anonymous person can sign a document as a friend of Alice, as a French citizen, or as someone that was in Paris in December, without revealing any identity. We refer to such scheme as history-based signatures.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [41] History-Based Inside-Outside Algorithm
    Feili, Heshaam
    Ghassem-Sani, Gholamreza
    ECAI 2006, PROCEEDINGS, 2006, 141 : 558 - 562
  • [42] A history-based method to estimate animal preference
    Maia, Caroline Marques
    Volpato, Gilson Luiz
    SCIENTIFIC REPORTS, 2016, 6
  • [43] Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature
    Chen, Tianfu
    Qi, Zhenghua
    Cheng, Jiagen
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 250 - 261
  • [44] Family history-based screening for colorectal cancer
    St John, DJB
    FAMILIAL CANCER AND PREVENTION: MOLECULAR EPIDEMIOLOGY - A NEW STRATEGY TOWARD CANCER CONTROL, 1999, : 59 - 63
  • [45] A Welfare Evaluation of History-Based Price Discrimination
    Gehrig, Thomas
    Shy, Oz
    Stenbacka, Rune
    JOURNAL OF INDUSTRY COMPETITION & TRADE, 2012, 12 (04): : 373 - 393
  • [46] History-based access control for distributed processes
    Martins, F
    Vasconcelos, V
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 98 - 115
  • [47] Trust-based recommendations for documents
    Hess, Claudia
    Schlieder, Christoph
    AI COMMUNICATIONS, 2008, 21 (2-3) : 145 - 153
  • [48] History-Based Verification of Functional Behaviour of Concurrent Programs
    Blom, Stefan
    Huisman, Marieke
    Zaharieva-Stojanovski, Marina
    SOFTWARE ENGINEERING AND FORMAL METHODS, 2015, 9276 : 84 - 98
  • [49] NEW HISTORY-BASED DELAY PREDICTORS FOR SERVICE SYSTEMS
    Thiongane, Mamadou
    Chan, Wyean
    L'Ecuyer, Pierre
    2016 WINTER SIMULATION CONFERENCE (WSC), 2016, : 425 - 436
  • [50] History-Based Fault Injection Testing for Cloud Platform
    Ma H.
    Nie C.-H.
    Wu H.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (10): : 2281 - 2296