CISPA
Browse

File(s) not publicly available

Pseudonymous Signature Schemes

chapter
posted on 2023-11-29, 18:26 authored by Przemyslaw Blaskiewicz, Lucjan HanzlikLucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The schemes aim to provide a strong cryptographic evidence of integrity of the signed data and origin of the signature, but at the same time have to hide the identity of the signatory. There are two crucial properties that are specific for pseudonymous signatures: ability to recover the real identity of the signatory in certain circumstances and resilience to Sybil attacks. Despite using a single private key, the signatory can create a (single) unlinkable pseudonym for each domain or sector of activity and generate signatures corresponding to this pseudonym.

History

Preferred Citation

Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik and Marta Wszola. Pseudonymous Signature Schemes. In: Advances in Cyber Security. 2019.

Primary Research Area

  • Algorithmic Foundations and Cryptography

Legacy Posted Date

2020-06-18

Book Title

Advances in Cyber Security

Chapter

8

Page Range

185-255

Open Access Type

  • Unknown

BibTeX

@incollection{cispa_all_3115, title = "Pseudonymous Signature Schemes", author = "Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta ", booktitle="{Advances in Cyber Security}", year="2019", }

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC