Abstract
The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for private authentication of ID documents, like passports, that embed a chip with computational abilities. Thanks to this privacy-friendly primitive, the document authenticates to a service provider through a reader and the resulting signatures are anonymous, linkable inside the service and unlinkable across services. A subsequent work proposes to enhance security and privacy of DSPS through group signatures techniques. In this paper, we improve on these proposals in three ways. First, we spot several imprecisions in previous formalizations. We consequently provide a clean security model for dynamic domain-specific pseudonymous signatures, where we correctly address the dynamic and adaptive case. Second, we note that using group signatures is somehow an overkill for constructing DSPS, and we provide an optimized construction that achieves the same strong level of security while being more efficient. Finally, we study the implementation of our protocol in a chip and show that our solution is well-suited for these limited environments. In particular, we propose a secure protocol for delegating the most demanding operations from the chip to the reader.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The \(\mathtt {SendToIssuer}\) oracle might be surprising here. But, contrary to group signatures, the issuing authority IA is not corrupted. This assumption is minimal since the IA may trace all honest users. Hence we must give the adversary the ability to interact as a corrupted user with the honest issuer.
- 2.
Our model takes into account the case where pseudonyms leak from the network. To this aim, the \(\mathtt {NymDomain}\) oracle gives the adversary a collection of pseudonyms.
- 3.
For sake of clarity, note that \((\mathsf {nym}_i,\mathsf {dsnym}_{ij})\) in [6] maps to \((i,\mathsf {nym}_{ij})\) in our model.
- 4.
\(\mathsf {Ext}\text {-}\mathsf {Commit}\) is an extractable commitment scheme (a perfectly binding computationally hiding commitment scheme where an extraction key allows to extract the committed value). \(\mathsf {NIZKPEqDL}(f,C,F,h)\) is a Non Interactive Zero Knowledge Proof of Equality of the Discrete Logarithm \(f\) of \(F\) w.r.t \(h\) with the value committed in \(C\).
- 5.
A revocation list is a set of revoked pseudonyms. Given a (pseudonym, signature) pair, the revocation test is a simple membership test. In practice, this can be done very efficiently.
References
Boneh, D., Boyen, X.: Short signatures without random oracles, the SDH assumption in bilinear groups. J. Crypt. 21(2), 149–177 (2008)
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS’04, pp. 132–145. ACM (2004)
Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents, Full version available at http://eprint.iacr.org/2014/067
Bringer, J., Chabanne, H., Patey, A.: Cross-unlinkable hierarchical group signatures. In: De Capitani di Vimercati, S., Mitchell, C. (eds.) EuroPKI 2012. LNCS, vol. 7868, pp. 161–177. Springer, Heidelberg (2013)
Bringer, J., Chabanne, H., Patey, A.: Collusion-resistant domain-specific pseudonymous signatures. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 649–655. Springer, Heidelberg (2013)
Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: Domain-specific pseudonymous signatures for the German identity card. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 104–119. Springer, Heidelberg (2012)
Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N., Warinschi, B.: Anonymous attestation with user-controlled linkability. Int. J. Inf. Sec. 12(3), 219–249 (2013)
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: CCS’04, pp. 168–177. ACM (2004)
Bundesamt fr Sicherheit in der Informationstechnik (BSI), Advanced Security Mechanisms for Machine Readable Travel Documents, Part 2 - Extended Access Control Version 2 (EACv2), Password Authenticated Connection Establishment (PACE), Restricted Identification (RI), TR-03110-2, March 2012
Camenisch, J.L., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)
Delerablée, C., Pointcheval, D.: Dynamic fully anonymous short group signatures. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193–210. Springer, Heidelberg (2006)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)
Pointcheval, D., Stern, J.: Security arguments for digital signatures, blind signatures. J. Crypt. 13(3), 361–396 (2000)
Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
Acknowledgements
The authors would like to thanks the anonymous reviewers for their valuable comments. This work has been partially funded by the European FP7 FIDELITY project (SEC-2011-284862). The opinions expressed in this document only represent the authors’ view. They reflect neither the view of the European Commission nor the view of their employer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix
A Appendix
1.1 A.1 A Proof of Knowledge of a Valid Certificate
Let \(\mathtt {P}\) be the protocol Fig. 3 for proving knowledge of \((f,(A,x))\) such that \(A=\big (g_1\cdot h^f\big )^{\frac{1}{\gamma +x}}\) and \(\mathsf {nym}=h^f\cdot \mathsf {dpk}^x\). In [3], we show that (i) for an honest verifier, the transcripts \(T\), \((R_1,R_2,R_3)\), \(c\), \((s_f,s_x,s_a,s_b,s_d)\) can be simulated in an indistinguishable way, without knowing any valid certificate, and that (ii) there exists an extractor for the protocol \(\mathtt {P}\).
1.2 A.2 Simulation of Signatures with Delegated Computation
We now adapt the proofs of our main scheme to the extended model of Sect. 4. We first simulate the \(\mathtt {GetPreComp}\) step. In the seclusiveness proof, all signatures are honestly computed. In the unforgeability proof, if \(i\ne \mathsf {i}\), then all signatures are honestly computed. If \(i=\mathsf {i}\), then, given \(\mathsf {H}\) (from the \(\mathsf {DL}\) challenge), \(A_\mathsf {i}\), \(x_\mathsf {i}\) and \(f_\mathsf {i}''\), \(B\) picks \(a,c,s_f,s_x,s_a,s_b\mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\) and computes \(B_1:=({A_\mathsf {i}}^{-x_\mathsf {i}}\cdot \mathsf {H}\cdot h^{f_\mathsf {i}''})^c\cdot A^{s_x}\cdot h^{a\cdot s_x-s_f-s_b}\) and \(B_2:=h^{a\cdot c-s_a}\). In the cross-domain anonymity proof, the challenger honestly computes signatures for all users, but \(\mathsf {i}\), for which signatures are simulated. Given \(\mathsf {A}\) (from the \(\mathsf {DDH}\) challenge) and \(f_\mathsf {i}\), \(B\) picks \(\alpha \mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\). The same \(\alpha \) is used in each signature, for consistency. Then, for each signature query, \(B\) picks fresh values \(a,c,s_f,s_x,s_a,s_b\) and computes \(B_1:=(\mathsf {A}^{-\alpha }\cdot h^{f_\mathsf {i}})^c\cdot T^{s_x}\cdot h^{-s_f-s_b}\) and \(B_2:=h^{a\cdot c-s_a}\). (The simulation is done as if \(A_\mathsf {i}:={g_1}^\alpha \).)
We now simulate the \(\mathtt {Sign}'\) oracle (identically in the three proofs). \(B\) retrieves \(m,B_1,B_2,c,s_a,s_x,s_a,s_b\) from the \(\mathtt {GetPreComp}\) step. Whatever \(D\) is (\(D\) may not equal \(e(B_1,g_2)\cdot e(B_2,w)\)), \(B\) picks \(s_d\mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\), computes \(T\), \(R_1\) and \(R_2\) as usual and sets \(c\) as the random oracle’s value for the input \(\mathsf {dpk}\Vert \mathsf {nym}\Vert T\Vert R_1\Vert R_2\Vert D\Vert m\). If \(D\) is correct w.r.t. \(B_1\) and \(B_2\), then \(B\) returns a valid signature. If not, then the signature is no longer valid but the response remains consistent w.r.t. \(B_1\) and \(B_2\). \(\square \)
Rights and permissions
Copyright information
© 2014 International Financial Cryptography Association
About this paper
Cite this paper
Bringer, J., Chabanne, H., Lescuyer, R., Patey, A. (2014). Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-45472-5_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45471-8
Online ISBN: 978-3-662-45472-5
eBook Packages: Computer ScienceComputer Science (R0)