Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents | SpringerLink
Skip to main content

Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8437))

Included in the following conference series:

  • 6026 Accesses

Abstract

The notion of domain-specific pseudonymous signatures (DSPS) has recently been introduced for private authentication of ID documents, like passports, that embed a chip with computational abilities. Thanks to this privacy-friendly primitive, the document authenticates to a service provider through a reader and the resulting signatures are anonymous, linkable inside the service and unlinkable across services. A subsequent work proposes to enhance security and privacy of DSPS through group signatures techniques. In this paper, we improve on these proposals in three ways. First, we spot several imprecisions in previous formalizations. We consequently provide a clean security model for dynamic domain-specific pseudonymous signatures, where we correctly address the dynamic and adaptive case. Second, we note that using group signatures is somehow an overkill for constructing DSPS, and we provide an optimized construction that achieves the same strong level of security while being more efficient. Finally, we study the implementation of our protocol in a chip and show that our solution is well-suited for these limited environments. In particular, we propose a secure protocol for delegating the most demanding operations from the chip to the reader.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The \(\mathtt {SendToIssuer}\) oracle might be surprising here. But, contrary to group signatures, the issuing authority IA is not corrupted. This assumption is minimal since the IA may trace all honest users. Hence we must give the adversary the ability to interact as a corrupted user with the honest issuer.

  2. 2.

    Our model takes into account the case where pseudonyms leak from the network. To this aim, the \(\mathtt {NymDomain}\) oracle gives the adversary a collection of pseudonyms.

  3. 3.

    For sake of clarity, note that \((\mathsf {nym}_i,\mathsf {dsnym}_{ij})\) in [6] maps to \((i,\mathsf {nym}_{ij})\) in our model.

  4. 4.

    \(\mathsf {Ext}\text {-}\mathsf {Commit}\) is an extractable commitment scheme (a perfectly binding computationally hiding commitment scheme where an extraction key allows to extract the committed value). \(\mathsf {NIZKPEqDL}(f,C,F,h)\) is a Non Interactive Zero Knowledge Proof of Equality of the Discrete Logarithm \(f\) of \(F\) w.r.t \(h\) with the value committed in \(C\).

  5. 5.

    A revocation list is a set of revoked pseudonyms. Given a (pseudonym, signature) pair, the revocation test is a simple membership test. In practice, this can be done very efficiently.

References

  1. Boneh, D., Boyen, X.: Short signatures without random oracles, the SDH assumption in bilinear groups. J. Crypt. 21(2), 149–177 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  2. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS’04, pp. 132–145. ACM (2004)

    Google Scholar 

  3. Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents, Full version available at http://eprint.iacr.org/2014/067

  4. Bringer, J., Chabanne, H., Patey, A.: Cross-unlinkable hierarchical group signatures. In: De Capitani di Vimercati, S., Mitchell, C. (eds.) EuroPKI 2012. LNCS, vol. 7868, pp. 161–177. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  5. Bringer, J., Chabanne, H., Patey, A.: Collusion-resistant domain-specific pseudonymous signatures. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 649–655. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: Domain-specific pseudonymous signatures for the German identity card. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 104–119. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N., Warinschi, B.: Anonymous attestation with user-controlled linkability. Int. J. Inf. Sec. 12(3), 219–249 (2013)

    Article  Google Scholar 

  8. Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: CCS’04, pp. 168–177. ACM (2004)

    Google Scholar 

  9. Bundesamt fr Sicherheit in der Informationstechnik (BSI), Advanced Security Mechanisms for Machine Readable Travel Documents, Part 2 - Extended Access Control Version 2 (EACv2), Password Authenticated Connection Establishment (PACE), Restricted Identification (RI), TR-03110-2, March 2012

    Google Scholar 

  10. Camenisch, J.L., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Delerablée, C., Pointcheval, D.: Dynamic fully anonymous short group signatures. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193–210. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  13. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Pointcheval, D., Stern, J.: Security arguments for digital signatures, blind signatures. J. Crypt. 13(3), 361–396 (2000)

    Article  MATH  Google Scholar 

  15. Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thanks the anonymous reviewers for their valuable comments. This work has been partially funded by the European FP7 FIDELITY project (SEC-2011-284862). The opinions expressed in this document only represent the authors’ view. They reflect neither the view of the European Commission nor the view of their employer.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roch Lescuyer .

Editor information

Editors and Affiliations

A Appendix

A Appendix

1.1 A.1 A Proof of Knowledge of a Valid Certificate

Let \(\mathtt {P}\) be the protocol Fig. 3 for proving knowledge of \((f,(A,x))\) such that \(A=\big (g_1\cdot h^f\big )^{\frac{1}{\gamma +x}}\) and \(\mathsf {nym}=h^f\cdot \mathsf {dpk}^x\). In [3], we show that (i) for an honest verifier, the transcripts \(T\), \((R_1,R_2,R_3)\), \(c\), \((s_f,s_x,s_a,s_b,s_d)\) can be simulated in an indistinguishable way, without knowing any valid certificate, and that (ii) there exists an extractor for the protocol \(\mathtt {P}\).

Fig. 3.
figure 3

The \(\mathtt {P}\) protocol

1.2 A.2 Simulation of Signatures with Delegated Computation

We now adapt the proofs of our main scheme to the extended model of Sect. 4. We first simulate the \(\mathtt {GetPreComp}\) step. In the seclusiveness proof, all signatures are honestly computed. In the unforgeability proof, if \(i\ne \mathsf {i}\), then all signatures are honestly computed. If \(i=\mathsf {i}\), then, given \(\mathsf {H}\) (from the \(\mathsf {DL}\) challenge), \(A_\mathsf {i}\), \(x_\mathsf {i}\) and \(f_\mathsf {i}''\), \(B\) picks \(a,c,s_f,s_x,s_a,s_b\mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\) and computes \(B_1:=({A_\mathsf {i}}^{-x_\mathsf {i}}\cdot \mathsf {H}\cdot h^{f_\mathsf {i}''})^c\cdot A^{s_x}\cdot h^{a\cdot s_x-s_f-s_b}\) and \(B_2:=h^{a\cdot c-s_a}\). In the cross-domain anonymity proof, the challenger honestly computes signatures for all users, but \(\mathsf {i}\), for which signatures are simulated. Given \(\mathsf {A}\) (from the \(\mathsf {DDH}\) challenge) and \(f_\mathsf {i}\), \(B\) picks \(\alpha \mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\). The same \(\alpha \) is used in each signature, for consistency. Then, for each signature query, \(B\) picks fresh values \(a,c,s_f,s_x,s_a,s_b\) and computes \(B_1:=(\mathsf {A}^{-\alpha }\cdot h^{f_\mathsf {i}})^c\cdot T^{s_x}\cdot h^{-s_f-s_b}\) and \(B_2:=h^{a\cdot c-s_a}\). (The simulation is done as if \(A_\mathsf {i}:={g_1}^\alpha \).)

We now simulate the \(\mathtt {Sign}'\) oracle (identically in the three proofs). \(B\) retrieves \(m,B_1,B_2,c,s_a,s_x,s_a,s_b\) from the \(\mathtt {GetPreComp}\) step. Whatever \(D\) is (\(D\) may not equal \(e(B_1,g_2)\cdot e(B_2,w)\)), \(B\) picks \(s_d\mathop {\leftarrow }\limits ^{\tiny {\$}}\mathbb {Z}_p\), computes \(T\), \(R_1\) and \(R_2\) as usual and sets \(c\) as the random oracle’s value for the input \(\mathsf {dpk}\Vert \mathsf {nym}\Vert T\Vert R_1\Vert R_2\Vert D\Vert m\). If \(D\) is correct w.r.t. \(B_1\) and \(B_2\), then \(B\) returns a valid signature. If not, then the signature is no longer valid but the response remains consistent w.r.t. \(B_1\) and \(B_2\).   \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Bringer, J., Chabanne, H., Lescuyer, R., Patey, A. (2014). Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics