How to Balance Privacy with Authenticity

  • Authors:
  • Pairat Thorncharoensri;Willy Susilo;Yi Mu

  • Affiliations:
  • Centre for Computer and Information Security School of Computer Science & Software Engineering, University of Wollongong, Australia;Centre for Computer and Information Security School of Computer Science & Software Engineering, University of Wollongong, Australia;Centre for Computer and Information Security School of Computer Science & Software Engineering, University of Wollongong, Australia

  • Venue:
  • Information Security and Cryptology --- ICISC 2008
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In several occasions, it is important to consider the privacy of an individual together with the authenticity of the message produced by that individual or hold by that individual. In the latter scenario, the authenticity of the message enables one to prove that the message that he/she holds is authentic to other people. Nonetheless, this will normally incur that the privacy of the signer will be exposed at the same time. In this paper, we consider a situation where the authenticity of the message will be ensured together with the privacy of the signature holder, if and only if the signature is designated once to a third party. However, as soon as there is more than one designation occurs, then the privacy of the signer (and the signature holder) will cease. We consider real scenarios where this type of notion is required. We formalize this notion as a one-time universal designated verifier signature , and for the first time in the literature, we provide a concrete scheme to realize this primitive.