This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals
July-September 2005 (vol. 2 no. 3)
pp. 268-272
Human users need trusted computers when they want to generate digital signatures. In many applications, in particular, if the users are mobile, they need to carry their trusted computers with themselves. Smart cards are easy to use, easy to carry, and relatively difficult to tamper with, but they do not have a user interface; therefore, the user still needs a terminal for authorizing the card to produce digital signatures. If the terminal is malicious, it can mislead the user and obtain a digital signature on an arbitrary document. In order to mitigate this problem, we propose a solution based on conditional signatures. More specifically, we propose a framework for the controlled revocation of unintended digital signatures. We also propose a solution with a special emphasis on privacy issues.

[1] B. Schneier and A. Shostack, “Breaking Up Is Hard to Do: Modelling Security Threats for Smart Cards,” Proc. USENIX Workshop Smart Card Technology, 1999.
[2] N. Asokan, H. Debar, M. Steiner, and M. Waidner, “Authenticating Public Terminals,” Computer Networks, 1999.
[3] R. Rivest, “Issues in Cryptography,” Proc. Conf. Computers, Freedom, Privacy, http://theory.lcs.mit.edu/~rivestRivest-IssuesInCryptography.pdf , 2001.
[4] I.Z. Berta, L. Buttyán, and I. Vajda, “Mitigating the Untrusted Terminal Problem Using Conditional Signatures,” Proc Int'l Conf. Information Technology (ITCC 2004), Apr. 2004.
[5] I.Z. Berta, L. Buttyán, and I. Vajda, “Privacy Protecting Protocols for Revokable Signatures,” Proc. Smart Card Research and Advanced Application IFIP Conf. (CARDIS 2004), 2004.
[6] M. Abadi, M. Burrows, C. Kaufman, and B. Lampson, “Authentication and Delegation with Smart-Cards,” Proc. Int'l Conf. Theoretical Aspects of Computer Science, 1992.
[7] D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. Rivest, “The Untrusted Computer Problem and Camera-Based Authentication,” Proc. Pervasive Computing Conf., 2002.
[8] T. Stabell-Kulo, R. Arild, and P. Myrvang, “Providing Authentication to Messages Signed with a Smart Card in Hostile Environments,” Proc. Usenix Workshop Smart Card Technology, May 1999.
[9] I.Z. Berta and I. Vajda, “Documents from Malicious Terminals,” Proc. SPIE Conf. Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, 2003.
[10] D. Chaum, “Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
[11] S. Brands, “Untraceable Off-Line Cash in Wallets with Observers,” Proc. Conf. Advances in Cryptology (Crypto '93), pp. 302-318, 1994.
[12] M. Franklin and M. Yung, “Towards Provably Secure Efficient Electronic Cash,” Technical Report CSUCS-018-92, Dept. of Computer Science, Columbia Univ., 1992.
[13] P. Syverson, D. Goldschlag, and M. Reed, “Anonymous Connections and Onion Routing,” Proc. IEEE Symp. Security and Privacy, 1997.
[14] B. Lee and K. Kim, “Fair Exchange of Digital Signatures Using Conditional Signature,” Proc. Symp. Cryptography and Information Security, 2002.
[15] A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proc. Conf. Privacy Enhancing Technologies (PET2002), 2002.
[16] R. Anderson and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” Proc. Fifth Int'l Workshop Security Protocols, 1997.
[17] W. Fung, M. Golin, and J. Gray, III, “Protection of Keys against Modification Attack,” Research Report 2001-04, HKUST Theoretical Computer Science Center, 2001.
[18] W. Rankl and W. Effing, Smart Card Handbook, third ed. John Wiley and Sons, 2003.

Index Terms:
Index Terms- Electronic commerce, security, authorization, privacy.
Citation:
Istv? Zsolt Berta, Levente Butty?, Istv? Vajda, "A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 268-272, July-Sept. 2005, doi:10.1109/TDSC.2005.28
Usage of this product signifies your acceptance of the Terms of Use.