Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many authors. In this paper, the biometric-based, convertible, and undeniable multi-signature scheme is proposed. The private and public keys are generated using a signer’s biometric data and a random secret value. Thus, lending the private key to the proxy signer is not possible. All the signers should participate in multi-signature generation and verification stages. The proposed scheme also provides a signature conversion process in which undeniable multi-signature is converted to the ordinary one. We demonstrate how our scheme is useful to ensure multi-author copyrights and profits.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zeng W., Yu H., Lin C. Y. (2006) Multimedia Security Technologies for Digital Right Management. Elsevier, Amsterdam, pp 197–218

    Google Scholar 

  2. Elgamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4): 469–472

    Article MathSciNet  Google Scholar 

  3. Chaum, D. (1990).“Undeniable signatures”, advances in cryptology. InProceedings of CRYPTO’89 (pp. 212–216). Berlin: Springer.

  4. Harn, L. (1993). (t,n) Threshold signature and digital multisignature. InWorkshop on cryptography & data security (pp. 61–73).

  5. Ratha N., Connell J., Bolle R. (2001) Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal 40(3): 614–634

    Article  Google Scholar 

  6. Juels, A., & Sudan, M. A fuzzy vault scheme,http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf.

  7. ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.

  8. Janbandhu P., Siyal M. (2001) Novel biometric digital signatures for internet-based applications. Information Management & Computer Security 9(5): 205–212

    Article  Google Scholar 

  9. Daugman, J. (1992). High confidence personal identifications by rapid video analysis of iris texture. InIEEE international carnahan conference on security technologies (pp. 50–60).

  10. Daugman J. (1993) High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11): 648–656

    Article  Google Scholar 

  11. Nagpal, R., & Nagpal, S. (May 2002). Biometric based Digital Signature Schemes, Internet Draft,http://www.ietf.org/internet-drafts/draft-nagpal-biometric-digital-signature-00.txt.

  12. Orvos, P. (March 2002). Towards biometric digital signatures. InNetworkshop (pp. 26–28). Eger: Eszterhazy College.

  13. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometrics. Advances in Cryptology—EUROCRYPT 2005. InLecture Notes in Computer Science 3494 (pp. 147–163). Berlin: Springer.

  14. Tuyls, P. & Goseling, J. (2004). Capacity and examples of template-protecting biometric authentication systems. InProceedings of BioAW 2004. Lecture Notes in Computer Science 3087 (pp. 158–170). Berlin: Springer.

  15. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. InCommunications of the ACM 21(2).

  16. FIPS PUB 186-3. (2009).Digital Signature Standard  (DSS), NIST.

Download references

Author information

Authors and Affiliations

  1. Division of Information and Communication Engineering, Baekseok University, Cheonan, Korea

    SungHyun Yun

  2. Department of Computer Science Education, Korea University, Seoul, Korea

    Heuiseok Lim & SoonYoung Jung

  3. Department of Computer Engineering, WonKwang University, Iksan, Korea

    Young-Sik Jeong

  4. School of Computer Engineering, Hanshin University, Osan, Korea

    Jae-Khun Chang

Authors
  1. SungHyun Yun

    You can also search for this author inPubMed Google Scholar

  2. Heuiseok Lim

    You can also search for this author inPubMed Google Scholar

  3. Young-Sik Jeong

    You can also search for this author inPubMed Google Scholar

  4. SoonYoung Jung

    You can also search for this author inPubMed Google Scholar

  5. Jae-Khun Chang

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toHeuiseok Lim.

Rights and permissions

About this article

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp