Group Signatures with Efficient Concurrent Join
- Aggelos KiayiasAffiliated withComputer Science and Engineering, University of Connecticut
- , Moti YungAffiliated withRSA LaboratoriesComputer Science, Columbia University
A group signature is a basic privacy mechanism. The group joining operation is a critical component of such a scheme. To date all secure group signature schemes either employed a trusted-party aided join operation or a complex joining protocol requiring many interactions between the prospective user and the Group Manager (GM). In addition no efficient scheme employed a join protocol proven secure against adversaries that have the capability to dynamically initiate multiple concurrent join sessions during an attack.
This work presents the first efficient group signature scheme with a simple Joining protocol that is based on a “single message and signature response” interaction between the prospective user and the GM. This single-message and signature-response registration paradigm where no other actions are taken, is the most efficient possible join interaction and was originally alluded to in 1997 by Camenisch and Stadler, but its efficient instantiation remained open till now.
The fact that joining has two short communication flows and does not require secure channels is highly advantageous: for example, it allows users to easily join by a proxy (i.e., a security officer of a company can send a file with all registration requests in his company and get back their certificates for distribution back to members of the company). It further allows an easy and non-interactive global system re-keying operation as well as straightforward treatment of multi-group signatures.We present a strong security model for group signatures (the first explicitly taking into account concurrent join attacks) and an efficient scheme with a single-message and signature-response join protocol.
- Group Signatures with Efficient Concurrent Join
- Book Title
- Advances in Cryptology – EUROCRYPT 2005
- Book Subtitle
- 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings
- pp 198-214
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
- Ronald Cramer (16)
- Editor Affiliations
- 16. CWI Amsterdam
- Author Affiliations
- 17. Computer Science and Engineering, University of Connecticut, Storrs, CT, USA
- 18. RSA Laboratories, Bedford, MA
- 19. Computer Science, Columbia University, New York, NY, USA
To view the rest of this content please follow the download PDF link above.