Skip to main content
placeholder image

How to balance privacy with authenticity

Conference Paper


Abstract


  • In several occasions, it is important to consider the privacy of an individual together

    with the authenticity of the message produced by that individual or hold by that individual.

    In the latter scenario, the authenticity of the message enables one to prove that the message that he/she

    holds is authentic to other people. Nonetheless, this will normally incur that the

    privacy of the signer will be exposed at the same time.

    In this paper, we consider a situation where the authenticity of the message will

    be ensured together with the privacy of the signature holder, if and only if the

    signature is designated once to a third party. However, as soon as there

    is more than one designation occurs, then the privacy of the signer (and the signature

    holder) will cease. We consider real scenarios where this type of notion is required.

    We formalize this notion as a one-time universal designated verifier signature,

    and for the first time in the literature, we provide a concrete scheme to realize this

    primitive.

Publication Date


  • 2008

Citation


  • Thorncharoensri, P., Susilo, W. & Mu, Y. (2008). How to balance privacy with authenticity. In P. J. Lee & J. H. Cheon (Eds.), International Conference on Information Security and Cryptology (pp. 184-201). Germany: Springer.

Scopus Eid


  • 2-s2.0-67049155492

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1590

Has Global Citation Frequency


Start Page


  • 184

End Page


  • 201

Place Of Publication


  • Germany

Abstract


  • In several occasions, it is important to consider the privacy of an individual together

    with the authenticity of the message produced by that individual or hold by that individual.

    In the latter scenario, the authenticity of the message enables one to prove that the message that he/she

    holds is authentic to other people. Nonetheless, this will normally incur that the

    privacy of the signer will be exposed at the same time.

    In this paper, we consider a situation where the authenticity of the message will

    be ensured together with the privacy of the signature holder, if and only if the

    signature is designated once to a third party. However, as soon as there

    is more than one designation occurs, then the privacy of the signer (and the signature

    holder) will cease. We consider real scenarios where this type of notion is required.

    We formalize this notion as a one-time universal designated verifier signature,

    and for the first time in the literature, we provide a concrete scheme to realize this

    primitive.

Publication Date


  • 2008

Citation


  • Thorncharoensri, P., Susilo, W. & Mu, Y. (2008). How to balance privacy with authenticity. In P. J. Lee & J. H. Cheon (Eds.), International Conference on Information Security and Cryptology (pp. 184-201). Germany: Springer.

Scopus Eid


  • 2-s2.0-67049155492

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1590

Has Global Citation Frequency


Start Page


  • 184

End Page


  • 201

Place Of Publication


  • Germany