Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
(Publisher: John Wiley & Sons, Inc.)
Author(s): Bruce Schneier
ISBN: 0471128457
Publication Date: 01/01/96
Previous | Table of Contents | Next |
David Chaum introduces this problem in [330]:
A company has several computers, each connected to the local network. Each department of that company has its own printer (also connected to the network) and only persons of that department are allowed to use their departments printer. Before printing, therefore, the printer must be convinced that the user is working in that department. At the same time, the company wants privacy; the users name may not be revealed. If, however, someone discovers at the end of the day that a printer has been used too often, the director must be able to discover who misused that printer, and send him a bill.
The solution to this problem is called a group signature. Group signatures have the following properties:
Group Signatures with a Trusted Arbitrator
This protocol uses a trusted arbitrator:
The problem with this protocol is that it requires a trusted party. Trent knows everyones private keys and can forge signatures. Also, m must be long enough to preclude attempts to analyze which keys each member uses.
Chaum [330] lists a number of other protocols, some in which Trent is unable to fake signatures and others in which Trent is not even required. Another protocol [348] not only hides the identity of the signer, but also allows new members to join the group. Yet another protocol is [1230].
Lets say Eve is a very powerful adversary. She has vast computer networks and rooms full of Cray computersorders of magnitude more computing power than Alice. All of these computers chug away, day and night, trying to break Alices private key. Finallysuccess. Eve can now impersonate Alice, forging her signature on documents at will.
Fail-stop digital signatures, introduced by Birgit Pfitzmann and Michael Waidner [1240], prevent this kind of cheating. If Eve forges Alices signatures after a brute-force attack, then Alice can prove they are forgeries. If Alice signs a document and then disavows the signature, claiming forgery, a court can verify that it is not a