A framework for the revocation of unintended digital signatures initiated by malicious terminals

被引:8
作者
Berta, IZ [1 ]
Buttyán, L [1 ]
Vajda, I [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, H-1521 Budapest, Hungary
基金
匈牙利科学研究基金会;
关键词
electronic commerce; security; authorization; privacy;
D O I
10.1109/TDSC.2005.28
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Human users need trusted computers when they want to generate digital signatures. In many applications, in particular, if the users are mobile, they need to carry their trusted computers with themselves. Smart cards are easy to use, easy to carry, and relatively difficult to tamper with, but they do not have a user interface; therefore, the user still needs a terminal for authorizing the card to produce digital signatures. It the terminal is malicious, it can mislead the user and obtain a digital signature on an arbitrary document. In order to mitigate this problem, we propose a solution based on conditional signatures. More specifically, we propose a framework for the controlled revocation of unintended digital signatures. We also propose a solution with a special emphasis on privacy issues.
引用
收藏
页码:268 / 272
页数:5
相关论文
共 18 条
[1]  
ABADI M, 1992, P INT C THEOR ASP CO
[2]  
ANDERSON RJ, 1997, P 5 INT WORKSH SEC P
[3]  
ASOKAN N, 1999, COMPUTER NETWORKS
[4]  
BERTA IZ, 2003, P SPIE C MICR NEW MI
[5]  
BERTA IZ, 2004, P INT C INF TECHN IT
[6]  
BERTA IZ, 2004, IFIP C CARDIS 2004
[7]  
Brands Stefan, 1994, LNCS, V773, P302, DOI [10.1007/3-540-48329-2_26, DOI 10.1007/3-540-48329-2_26]
[8]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[9]  
CLARKE D, 2002, P PREV COMP C
[10]  
FRANKLIN M, 1992, CSUCS01892 COL U DEP