Blind Digital Signatures, Group Digital Signatures and Revocable Anonymity Vijay Gabale Ashutosh Dhekne Sagar Bijwe Nishant Burte MTech 1st Year, CSE Dept., IIT Bombay Network Security Project Presentation, CSE Department, IIT Bombay

Blind Signatures What are blind digital signatures? 

Signer signs the document without actually looking at its contents

The need for blind signatures Cast vote

Voter

Voting Center

Voting Scheme Check credentials, curb duplicates Authentication, Blinded vote

Election Authority sign on blinded vote

Unblind vote, retain signature

Verification using public key

Cast vote

Voter

Voting Center

Blinding Using RSA Check credentials, Sign(B)=Bd B= authentication, B H(m).re

Election Authority Sign(B) = (H(m).re)d Sign(B) = H(m)d.r

(Sign(m))e = H(m)

Sign(m) = Sign(B)/r Cast vote

Voter

Voting Center

Need for grouping  

Multiple election authorities One public key for the voting center to verify

Voting Center

Group Digital Signature Internal Structure?

Security Wishlist 

Unforgeability 



Conditional Signer Anonymity 



No one other than group members should be able to produce a valid signature No one but the Group Manager should be able to determine which member issued the signature

Undeniable Signer Identity 

Identity when revoked should be provable to an external law enforcement authority

Security Wishlist Continued… 

Unlinkability 



Security against Framing Attacks 



Determining if two different signatures were issued by the same member is infeasible A group member not be able to produce signatures which give someone else’s identity

Coalition Resistant 

Members colluding to produce irrevocable keys should be infeasible

Setup Phase   

Two large prime numbers p &q RSA public key (n,e), private key (n,d) Group G :   



|G|=n Cyclic subgroup of Zp2* such that n divides p2-1 Primitive root : g(p2-1)/pi ≠ 1 mod p2

Group Public key : Y =(n,e,G,g,a,λ, μ)

Digital Signatures

x

y m || s

f(H(m))

f(s)=H(m)

x

Requirements : Anonymity, Revocation x

ax = y Infeasibility of Calculating Discrete log

Digital Signatures PR key x

PR key x

PB key y

?? ??? ?

A New Scheme

Signature of Knowledge

Signature of Knowledge Digital Signature

Hash Sign

ri(1 to |c|)

x

ax = y

Pi = a

ri

C = H ( m, y, Pi ) Si = ri

if c [ i ] = 0

Si = ri - x

if c [ i ] = 1 PB m || (c,s,y)

m || sign

Verification C = H ( m, y, Pi )

( C, S, y )

Pi = a

ri

Group Public Key

Pi = a Si Pi = a x

Si

y

if c [ i ] = 0

Si = ri if c [ i ] = 0

if c [ i ] = 1

Si = ri - x if c [ i ] = 1

m || (c,s,y) Group Public Key

Revocation y

Epwd( z =gy )

Signature : (g~,z~, C, S )

Is g~y’ = z~ ? Group Member

y

ID

y1

ID1

Join Protocol - Revisited

y = ax z = gy V = ( y + 1 )d

Quasi-Coalition Attack Private Key

Certificate

x -x

A=(ax + 1)d =axd(1 + a-x)d B=(a-x + 1)d

rx

C=(arx + 1)d

-rx

C ( A B-1)-r

Modified Join Protocol y’ = ax u

y = ax + u z = gy V = ( y + 1 )d

Demo

Timing Analysis Seconds

Average time required vs key size 45 40 35 30 25 20 15 10 5 0

Sign Verify

256 bit

512 bit Key Size

Time Required vs File Size (Verify)

50

50

40

40

30

256 bit

20

512 bit

Seconds

Seconds

Time Required vs File Size (Sign)

30

256 bit

20

512 bit

10

10

0

0 6

1510

108483

File Size (bytes)

5124570

6

1510

108483

File Size (bytes)

5124570

Additional Applications 

Applying for Patents (Blind Signatures)



Insurance Company (Group Digital Signatures)



e-Banking (Group Blind Digital Signatures)

Conclusion 



Anonymity & revocation features of Group Signatures are suitable in current scenarios like organization hierarchy Added advantage of reducing the burden off PKI & CA employing a single Group Public key for verification

References 

Z.A. Ramzan, Group Blind Digital Signatures: Theory and Applications, Master of Science, MIT, 1999. http://citeseer.ist.psu.edu/ramzan99group.html



David Chaum, Blind signatures for untraceable payments. In Proc. CRYPTO 82, pages 199-203, New York, 1983. Plenum Press.



Jan Camenisch and Markus Stadler, Efficient group signatures for large groups. In Proc. CRYPTO 97, pages 410-424. SpringerVerlag, 1997. Lecture Notes in Computer Science No. 1294.



S. Kopsell, R. Wendolsky, H. Federrath, Revocable Anonymity. In Proc. ETRICS 2006, pages 206-220, LNCS 3995, SpringerVerlag, Heidelberg 2006

Questions

Network Security Project Presentation, CSE Department, IIT Bombay

Thank you

Network Security Project Presentation, CSE Department, IIT Bombay

Blind Digital Signatures, Group Digital Signatures ... - Ashutosh Dhekne

Network Security Project Presentation,. CSE Department, IIT Bombay ... RSA public key (n,e), private key (n,d). ▫ Group G : ❑ |G|=n. ❑ Cyclic subgroup of Z p2.

366KB Sizes 1 Downloads 291 Views

Recommend Documents

Blind Digital Signatures, Group Digital Signatures ... - Ashutosh Dhekne
Network Security Course Project ..... merchant seeing a note must be able to check that the note is indeed valid, but need not ... checking validity and non-duplicity of votes. ..... collect connection data and deanonymise some of their users.

Blind Digital Signatures, Group Digital Signatures ... - Ashutosh Dhekne
Network Security Project Presentation,. CSE Department, IIT ... Check credentials,. Sign(B)=Bd. Cast vote . Sign(m) = Sign(B)/r. (Sign(m))e = H(m) ...

using digital signatures in a pdf file
There was a problem previewing this document. Retrying... Download. Connect more ... using digital signatures in a pdf file. using digital signatures in a pdf file.

Signatures - Simavi
Defence for Children. The Netherlands. DOEN Foundation ... Friends of the Earth (England, Wales & Northern Ireland). United Kingdom. Fundacion Arcoiris.

Signatures - Simavi
and unsafe abortions at the cost of women's health and lives in particular in the poorest ... Centre for Youth Empowerment and Civic Education (CYECE). Malawi.

Greening the Internet; Power Optimization - Ashutosh Dhekne
Building faster, smaller and more powerful computer systems has been a ... of power has been a consideration only in laptops and devices that are not mains .... is set to 0.1, the station remains awake for 10 beacons and then sleeps between.

Greening the Internet; Power Optimization - Ashutosh Dhekne
of power has been a consideration only in laptops and devices that are not ..... [9] have connected a low power radio to a PDA so that the main PDA does not.

Scalable Group Signatures with Revocation - Research at Google
For a digital signature scheme to be adopted, an efficient ... membership revocation remains a non-trivial problem in group signatures: all existing solutions are ...

Controllable Ring Signatures
modularly derived from the paradigm [5]. Here we omit the proof from scratch. Fact 3. SSign /SVerify is transformed from the identification protocol based DLP.

Creating signatures for ClamAV - GitHub
Dec 9, 2007 - 2 Debug information from libclamav .... The hash-based signatures shall not be used for text files, HTML and any other .... 10 = PDF files.

Borromean Ring Signatures - Semantic Scholar
Jun 2, 2015 - We call f an admissibility function; then an admissible set V of verification keys is one .... efficient protocols, ACM Conference on Computer and Communications Security, 1993, pp. ... 20Cryptology/HTML/PDF/C89/239.PDF. 11.

480 Total Signatures
PetitionOnline.com has disabled the display of email addresses for signatories who chose to ... For technical support please use our simple Petition Help form.

A Method for Obtaining Digital Signatures and Public-Key
The security of the system rests in part on the difficulty of factoring .... It is easy to imagine an encryption device in your home terminal allowing you to sign checks ...

Subthreshold muscle twitches dissociate oscillatory neural signatures ...
Nov 1, 2013 - in time-frequency domain analyses of EEG data. In particular, both .... EEG/EMG acquisition and analysis procedures was the same across all four studies. ..... can be subjected to parametric statistical analyses, such as t-tests.

Electronic Signatures under Taiwan Law.pdf
Electronic Signatures under Taiwan Law.pdf. Electronic Signatures under Taiwan Law.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Electronic ...

full signatures zona 1.pdf
7. 8. 9. 10. Page 1 of 1. full signatures zona 1.pdf. full signatures zona 1.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying full signatures zona 1.pdf.

Aggregating CL-Signatures Revisited: Extended Functionality and ...
Aggregate signature is a new type of PKS which enables any user to combine signatures signed by ... Types of Aggregate Signature. ○. The types of aggregate signatures are categorized as full aggregation, ..... element and one integer, and the aggre

Electronic Signatures under Taiwan Law.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Electronic ...

Subthreshold muscle twitches dissociate oscillatory neural signatures ...
Nov 1, 2013 - tection, and their relationship to online action adjustment. ..... then full errors (mean EMG onsets from stimulus onset in ms: 289,. 506 ...... Ridderinkhof, K.R., van den Wildenberg, W.P., Segalowitz, S.J., Carter, C.S., 2004b.

Comparison of XMAC and BMAC Protocols - Ashutosh Dhekne
X-MAC offers better duty cycling opportunities—nodes sleep for ... One is alone, two is company, three is crowd! ... Software requirements. ▫ The simulation ...

Blinded-Key Signatures: securing private keys ...
signature, which allows the inclusion of private keys in au- tonomous mobile agents. This novel approach can be ap- plied to many well-known digital signature ...

Early dissociation between neural signatures of ...
Feb 10, 2012 - 1999; Reynolds et al., 2000; Martinez-Trujillo and Treue, 2002). In humans, top-down attention acts by suppressing alpha band oscillations in visual areas contralateral to the attended location. (e.g., Worden et al., 2000; Thut et al.,

Spatial Signatures for Lightweight Security in Wireless ...
“spatial signature” of a node, which is a physical ... requirements that the spatial signature protocol must ... we refer to as motes, embedded in a K-dimensional.