1.1 Scope and Contribution
This paper presents a pseudonym system which is
based on the public key cryptosystem. The main idea
is to use a single trusted master secret key with many
matching public keys (pseudonyms). The proposed
system gives users the ability to generate multiple
pseudonyms (that are independent of the master pub-
lic key) from a trusted master secret key. An impor-
tant propertyof the system is that, it providesusers the
ability to generate signatures using the master secret
key, which are verifiable using certificates that were
issued against pseudonyms.
Let us consider an example. Consider a TPM
(Trusted Platform Module) chip that is integrated into
a computing platform (such as mobile phones, lap-
tops, etc.). The chip contains a certified public-secret
key pair. The public key is certified by its manu-
facturer and recorded on the TPM chip at the time
of manufacturing. The certified public key of the
chip can be used to authenticate the machine with the
TPM. The TPM is used to further certify public keys
of users associated with the machine. A verifier can
authenticate a user based on the certificate chain con-
sisting of the user certificate, the TPM certificate and
the manufacturer certificate. But, revealing the iden-
tity of the machine to every verifier would not only
compromise the anonymity of the machine but also
the anonymity of user(s) of the machine. It is pos-
sible to identify a user using their pseudonyms but,
the verifier trusts only the TPM chip’s certified public
key and not the operating system of the machine or
any newly generated pseudonyms. Therefore, we re-
quire a system that gives a user the ability to generate
and control the usage of multiple identities based on
a trusted master identity (TPM’s certified public key),
where the pseudonyms should not only be indepen-
dent of the master identity (anonymity), but also there
is a relation between all pseudonyms generated
1
and
the trusted master secret key stored in the chip (we
call this relation colligation).
Anonymity and colligation are in some sense con-
tradictory. Anonymity requires that, it is impos-
sible (at least computationally) for an entity with
knowledge of a pseudonym, to link that pseudonym
with either the master identity or any other gener-
ated pseudonym. Whereas, colligation requires that
the prover is guaranteed that there is an underly-
1
To a certifier it is essential that the system provides
guarantee that, all pseudonyms from a particular TPM can
be traced back to a single secret key, but a verifier needs
proof of this binding between the master secret key and only
the pseudonym that he/she is currently presented with. We
do not make this distinction here.
ing link that exists between all pseudonyms (that ap-
pear to be unrelated to each other) was generated
from the trusted master secret key. Previously pub-
lished proposals like, (Damgard, 1988; Lysyanskaya
et al., 1999; Camenisch and Lysyanskaya, 2002;
Chen, 1995; Canetti et al., 2000; Chaum, 1985) that
achieved anonymity have considered a user’s iden-
tity that consists of public-secret key pair as a sin-
gle unified structure. Under a such assumption it
is unfeasible to obtain both anonymity and colliga-
tion. We aim to segregate the structure and provide
anonymity to a user but still maintain colligation be-
tween pseudonyms generated using the user’s master
secret key. The implication of this structure is that,
a user’s master secret key becomes highly valuable,
as all his pseudonyms are linked directly to the secret
key.
Based on the security requirement of non reveal-
able master public key in a TPM, Brickell et al.
proposed a method for direct anonymous attestation
(DAA) (Brickell et al., 2004) that provides anonymity
to a user based on the Camenisch-Lysyanskaya cre-
dential system (Camenisch and Lysyanskaya, 2002).
Unfortunately, the scheme (Brickell et al., 2004) does
not provide secret key linkability for identities that are
generated. Consequently, in their scheme, the TPM
needs to maintain a database of those identities and
associated secret keys. The database can get quite
large if the TPM serves a large group of users. Also,
their DAA scheme does not support identity transfer
among machines. In this paper we limit ourselves to
the problem of achieving anonymity and colligation,
and we do not address the issue of identity transfer.
1.2 Organisation
Section 2 provides the background on anonymouscer-
tification system and cryptographic techniques em-
ployed. In Section 3 we provide our construction, and
in Section 4, we discuss its security. In Section 5, we
discuss integration of our proposal in a TPM based
setting and conclude in Section 6.
2 BACKGROUND
User anonymity and colligation between master se-
cret key and user generated identities is of paramount
importance. To provide anonymity to user gener-
ated identities (pseudonyms) our proposal will make
use of an anonymous certification scheme, such as,
a scheme with blind signatures. An anonymous cer-
tification system is necessary to provide anonymity
to a user and to prevent collusion between a certi-
CERTIFIED PSEUDONYMS COLLIGATED WITH MASTER SECRET KEY
191