Traceable identity-based group signature

Gu, Ke, Yang, Lihao, Wang, Yong and Wen, Sheng 2016, Traceable identity-based group signature, RAIRO - Theoretical informatics and applications, vol. 50, no. 3, pp. 193-226, doi: 10.1051/ita/2016021.

Attached Files
Name Description MIMEType Size Downloads

Title Traceable identity-based group signature
Author(s) Gu, Ke
Yang, Lihao
Wang, Yong
Wen, Sheng
Journal name RAIRO - Theoretical informatics and applications
Volume number 50
Issue number 3
Start page 193
End page 226
Total pages 34
Publisher EDP sciences
Place of publication Les Ulis, France
Publication date 2016-07
ISSN 0988-3754
1290-385X
Keyword(s) Science & Technology
Technology
Computer Science, Information Systems
Computer Science
Group signature
identity-based cryptography
traceability
security model
VERIFIER-LOCAL REVOCATION
EFFICIENT REVOCATION
BILINEAR MAPS
ANONYMOUS CREDENTIALS
PROXY SIGNATURE
STANDARD MODEL
PAIRINGS
SCHEMES
SECURE
ACCUMULATORS
Summary Group signature is a useful cryptographic primitive, which makes every group member sign messages on behalf of a group they belong to. Namely group signature allows that group member anonymously signs any message without revealing his/her specific identity. However, group signature may make the signers abuse their signing rights if there are no measures of keeping them from abusing signing rights in the group signature schemes. So, group manager must be able to trace (or reveal) the identity of the signer by the signature when the result of the signature needs to be arbitrated, and some revoked group members must fully lose their capability of signing a message on behalf of the group they belong to. A practical model meeting the requirement is verifier-local revocation, which supports the revocation of group member. In this model, the verifiers receive the group member revocation messages from the trusted authority when the relevant signatures need to be verified. With the rapid development of identity-based cryptography, several identity-based group signature (IBGS) schemes have been proposed. Compared with group signature based on public key cryptography, IBGS can simplify key management and be used for more applications. Although some identity-based group signature schemes have been proposed, few identity-based group signature schemes are constructed in the standard model and focus on the traceability of signature. In this paper, we present a fully traceable (and verifier-local revocation) identity-based group signature (TIBGS) scheme, which has a security reduction to the computational Diffie-Hellman (CDH) assumption. Also, we give a formal security model for traceable identity-based group signature and prove that the proposed scheme has the properties of traceability and anonymity.
Language eng
DOI 10.1051/ita/2016021
Field of Research 010399 Numerical and Computational Mathematics not elsewhere classified
0103 Numerical And Computational Mathematics
0802 Computation Theory And Mathematics
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, EDP Sciences
Persistent URL http://hdl.handle.net/10536/DRO/DU:30090626

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 135 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Tue, 17 Jan 2017, 13:57:03 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.