Abstract
In some systems, users might want to identify themselves by their pseudonyms. If access control is necessary, then a certificate of authorized access employing pseudonyms must be unforgeable. We call a certificate of authorized access a credential. If different pseudonyms which identify a user are to be unlinkable, the user must be able to choose his pseudonyms at random and to transfer the credential issued on one pseudonym to another pseudonym untraceably. However, in order to prevent forgery of the certificate, pseudonyms must be formed in a specific way. This work presents a pseudonym validation process based on discrete logarithms without using cut-and-choose. The certificates issued with pseudonyms are unforgeable. The privacy of users is protected unconditionally. This pseudonym system has the novel feature that each user has a validated public key relevant to each pseudonym, so that signatures can be made by pseudonyms.
Preview
Unable to display preview. Download preview PDF.
References
S. Brands. Untraceable Off-line Cash in Wallet with Observers. In Advances in Cryptology — Proceedings of CRYPTO 93. Lecture Notes in Computer Science #773, Springer-Verlag, 1994, pp. 302–318.
S. Brands. Untraceable Off-line Cash Based on the Representation Problem. manuscript. To be published as a CWI Technical Report in January/February, 1994.
D. Chaum, J. H. Evertse. A Secure and Privacy Protecting Protocol for Transmitting Personal Information between Organizations. In Advances in Cryptology — proceedings of CRYPTO 86, Lecture Notes in Computer Science #263, pages 118–168. Springer-Verlag, 1986.
D. Chaum and T. P. Pedersen. Wallet Databases with Observers. In Advances in Cryptology — proceedings of CRYPTO 92, Lecture Notes in Computer Science #740, pages 89–105. Springer-Verlag, 1992.
L. Chen, I. Damgård and T. P. Pedersen. Parallel divertibility of proof of knowledge. In Advances in Cryptology — proceedings of EUROCRYPT 94, Lecture Notes in Computer Science pages ?–?. Springer-Verlag, 1995.
I. B. Damgaard. Payment Systems and Credential Mechanisms with Provably Security Against Abuse by Individual. In Advances in Cryptology — proceedings of CRYPTO 88, Lecture Notes in Computer Science #403, pages 328–335. Springer-Verlag, 1990.
W. Diffie and M. E. Hellman New Directions in Cryptography. In IEEE Trans. Inform., IT-22(6):644–654, November, 1976.
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Pre-proceedings of EURO-CRYPT 86, pages 186–194. 1987.
T. Okamoto, J. K. Ohta. Divertible zero-knowledge interactive proofs and commutative random self-reducibility In Advances in Cryptology — proceedings of EUROCRYPT' 89, Lecture Notes in Computer Science #434, pages 134–149. Springer-Verlag, 1990.
R. Rivest, A. Shamir, and L. Adleman A method for abtaining digital signatures and public-key cryptosystems In Commun. ACM Vol. 21, pp. 120–126, 1978.
C. P. Schnorr. Efficient identification and signatures for smart cards. In Advances in Cryptology — proceedings of CRYPTO 89, Lecture Notes in Computer Science, pages 239–252. Springer-Verlag, 1990.
G. J. Simmons. The Prisoner's Problem and the Subliminal Problems. In Advances in Cryptology — proceedings of CRYPTO 83, Plenum Press, pages 51–67. 1984.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, L. (1996). Access with pseudonyms. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032362
Download citation
DOI: https://doi.org/10.1007/BFb0032362
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive