175Accesses
Abstract
Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many authors. In this paper, the biometric-based, convertible, and undeniable multi-signature scheme is proposed. The private and public keys are generated using a signer’s biometric data and a random secret value. Thus, lending the private key to the proxy signer is not possible. All the signers should participate in multi-signature generation and verification stages. The proposed scheme also provides a signature conversion process in which undeniable multi-signature is converted to the ordinary one. We demonstrate how our scheme is useful to ensure multi-author copyrights and profits.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.
Similar content being viewed by others
References
Zeng W., Yu H., Lin C. Y. (2006) Multimedia Security Technologies for Digital Right Management. Elsevier, Amsterdam, pp 197–218
Elgamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4): 469–472
Chaum, D. (1990).“Undeniable signatures”, advances in cryptology. InProceedings of CRYPTO’89 (pp. 212–216). Berlin: Springer.
Harn, L. (1993). (t,n) Threshold signature and digital multisignature. InWorkshop on cryptography & data security (pp. 61–73).
Ratha N., Connell J., Bolle R. (2001) Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal 40(3): 614–634
Juels, A., & Sudan, M. A fuzzy vault scheme,http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf.
ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.
Janbandhu P., Siyal M. (2001) Novel biometric digital signatures for internet-based applications. Information Management & Computer Security 9(5): 205–212
Daugman, J. (1992). High confidence personal identifications by rapid video analysis of iris texture. InIEEE international carnahan conference on security technologies (pp. 50–60).
Daugman J. (1993) High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11): 648–656
Nagpal, R., & Nagpal, S. (May 2002). Biometric based Digital Signature Schemes, Internet Draft,http://www.ietf.org/internet-drafts/draft-nagpal-biometric-digital-signature-00.txt.
Orvos, P. (March 2002). Towards biometric digital signatures. InNetworkshop (pp. 26–28). Eger: Eszterhazy College.
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometrics. Advances in Cryptology—EUROCRYPT 2005. InLecture Notes in Computer Science 3494 (pp. 147–163). Berlin: Springer.
Tuyls, P. & Goseling, J. (2004). Capacity and examples of template-protecting biometric authentication systems. InProceedings of BioAW 2004. Lecture Notes in Computer Science 3087 (pp. 158–170). Berlin: Springer.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. InCommunications of the ACM 21(2).
FIPS PUB 186-3. (2009).Digital Signature Standard (DSS), NIST.
Author information
Authors and Affiliations
Division of Information and Communication Engineering, Baekseok University, Cheonan, Korea
SungHyun Yun
Department of Computer Science Education, Korea University, Seoul, Korea
Heuiseok Lim & SoonYoung Jung
Department of Computer Engineering, WonKwang University, Iksan, Korea
Young-Sik Jeong
School of Computer Engineering, Hanshin University, Osan, Korea
Jae-Khun Chang
- SungHyun Yun
You can also search for this author inPubMed Google Scholar
- Heuiseok Lim
You can also search for this author inPubMed Google Scholar
- Young-Sik Jeong
You can also search for this author inPubMed Google Scholar
- SoonYoung Jung
You can also search for this author inPubMed Google Scholar
- Jae-Khun Chang
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toHeuiseok Lim.
Rights and permissions
About this article
Cite this article
Yun, S., Lim, H., Jeong, YS.et al. The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits.Wireless Pers Commun60, 405–418 (2011). https://doi.org/10.1007/s11277-011-0298-3
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative