About group digital signatures
Keywords:
group digital signature, privacy, identification, ACJT signature, CG signatureAbstract
Group signatures try to combine security (no framing, no cheating) and privacy(anonymity, unlinkability).A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature. However, in the case of dispute the identity of the signature's originator can be revealed by a designated entity (group manager). The present paper describes the main concepts about group signatures, along with a brief state of the art and shows a personal cryptographic library implemented in Java that includes two group signatures.
References
A. Menezes, P. van Orschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
J. Camenisch. “Group signature schemes and payment systems based on the discrete logarithm problem”. PhD thesis, vol. 2 of ETH Series in Information Security an Cryptography, Hartung-Gorre Verlag, Konstanz, 1998. ISBN 3-89649-286-1.
Giuseppe Ateniese , Jan Camenisch , Marc Joye , and Gene Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme ”, Advances in Cryptology – CRYPTO 2000, vol. 1880 of Lecture Notes in Computer Science, pp. 255–270, Springer-Verlag, 2000.
“Efficient constructions and anonymity from trapdoor-holders," in Cryptology ePrint Archive, Report 2004/076, 2004.
A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems," in Advances in Cryptology - CRYPTO'86, LNCS 263, pp. 186-194, Springer, 1987.
D. Chaum and E. van Heyst. “Group signatures”. In D. W. Davies, editor, Proceedings of Eurocrypt 1991, volume 547of LNCS, pages 257-65. Springer-Verlag, Apr. 1991.
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation, Oct. 2004.
IEEE P1556 Working Group, VSC Project. Dedicated short range communications (DSRC), 2003
Jan Camenisch and Markus Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In Advances in Cryptology - CRYPTO '97, volume 1296 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
Jan Camenisch and Markus Michels. A Group Signature Scheme with Improved Efficiency. In Advances in Cryptology – ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 160-174. Springer, 1998.
Aggelos Kiayias and Moti Yung. Group Signatures: Provable Security, Ecient Constructions and Anonymity from Trapdoor-Holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/2004/076.
L. Chen and T. P. Pedersen. “New group signature schemes”. In EUROCRYPT '94, vol. 950 of LNCS, pp. 171-181. Springer-Verlag, 1995.
A. Lysyanskaya and Z. Ramzan. “Group blind digital signatures: A scalable solution to electronic cash”. In Proc. Financial Cryptography, 1998.
J. Camenisch. “Efficient anonymous fingerprinting with group signatures”. In ASIACRYPT 2000, vol. 1976 of LNCS, pp. 415{428. Springer Verlag, 2000.
J. Kilian and E. Petrank. Identity escrow. In CRYPTO '98, vol. 1642 of LNCS, pp. 169-185, Berlin, 1998. Springer Verlag.
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, and Nobuo Funabiki. Group Signature Schemes with Membership Revocation for Large Groups. In Information Security and Privacy, 10th Australasian Conference, volume 3574 of Lecture Notes in Computer Science, pages 2443454. Springer, 2005.
Java Cryptography Architecture http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html ;
http://docs.oracle.com/javase/1.4.2/docs/guide/security/CryptoSpec.html
Camenisch şi Groth, “Group Signatures: Better Efficiency and New Theoretical Aspects“
Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Security in Communication Networks volume 2576 of Lecture Notes in Computer Science , pages 268-289. Springer, 2003.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The author(s) is responsible for the correctness and legality of the paper content.
- Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.
- It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.
- The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.
JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://jmeds.eu.
Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice.