Skip to main content

Who Let the \(\mathcal {DOGS}\) Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening

  • Conference paper
  • First Online:
Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2020, CBT 2020)

Abstract

Over the past two decades, group signature schemes have been developed and used to enable authenticated and anonymous peer-to-peer communications. Initial protocols rely on two main authorities, Issuer and Opener, which are given substantial capabilities compared to (regular) participants, such as the ability to arbitrarily identify users. Building efficient, fast, and short group signature schemes has been the focus of a large number of research contributions. However, only a few dealt with the major privacy-preservation challenge of group signatures; this consists in providing user anonymity and action traceability while not necessarily relying on a central and fully trusted authority. In this paper, we present \(\mathcal {DOGS}\), a privacy-preserving Blockchain-supported group signature scheme with a distributed Opening functionality. In \(\mathcal {DOGS}\), participants no longer depend on the Opener entity to identify the signer of a potentially fraudulent message; they instead collaborate and perform this auditing process themselves. We provide a high-level description of the \(\mathcal {DOGS}\) scheme and show that it provides both user anonymity and action traceability. Additionally, we prove how \(\mathcal {DOGS}\) is secure against message forgery and anonymity attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319–331. Springer, Heidelberg (2006). https://doi.org/10.1007/11693383_22

    Chapter  Google Scholar 

  2. Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30574-3_11

    Chapter  Google Scholar 

  3. Blömer, J., Juhnke, J., Löken, N.: Short group signatures with distributed traceability. In: Kotsireas, I.S., Rump, S.M., Yap, C.K. (eds.) MACIS 2015. LNCS, vol. 9582, pp. 166–180. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32859-1_14

    Chapter  Google Scholar 

  4. Camenisch, J., Drijvers, M., Lehmann, A., Neven, G., Towa, P.: Short threshold dynamic group signatures. IACR Cryptol. ePrint Arch. 2020, 16 (2020)

    Google Scholar 

  5. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_22

    Chapter  Google Scholar 

  6. Ghadafi, E.: Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability. In: Aranha, D., Menezes, A. (eds.) International Conference on Cryptology and Information Security in Latin America, pp. 327–347. Springer, Cham (2014)

    Google Scholar 

  7. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  8. Neji, W., Blibech, K., Rajeb, N.B.: A survey on e-voting protocols based on secret sharing techniques. Proc. CARI 2018, 142 (2018)

    Google Scholar 

  9. Perera, M.N.S., Koshiba, T.: Fully dynamic group signature scheme with member registration and verifier-local revocation. In: Ghosh, D., Giri, D., Mohapatra, R.N., Sakurai, K., Savas, E., Som, T. (eds.) ICMC 2018. SPMS, vol. 253, pp. 399–415. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-2095-8_31

    Chapter  Google Scholar 

  10. Sakai, Y., Schuldt, J.C.N., Emura, K., Hanaoka, G., Ohta, K.: On the security of dynamic group signatures: preventing signature hijacking. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 715–732. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_42

    Chapter  Google Scholar 

  11. Schindler, P., Judmayer, A., Stifter, N., Weippl, E.: Ethdkg: Distributed key generation with ethereum smart contracts. Technical Report, Cryptology ePrint Archive, Report 2019/985, 2019. https://eprint.iacr.org (2019)

  12. Yang, G., Wong, D.S., Deng, X., Wang, H.: Anonymous signature schemes. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 347–363. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_23

    Chapter  Google Scholar 

Download references

Acknowledgements

We would like to express our great appreciation to E. Lochin for his valuable and constructive suggestions during the planning and development of this research work.

This work was partly supported by the French government through the Toulouse graduate School of Aerospace Engineering (TSAE). Contract ANR-17-EURE-0005. This work has also been supported by the Optus Macquarie University Cyber Securiy Hub.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marina Dehez-Clementi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dehez-Clementi, M., Deneuville, JC., Lacan, J., Asghar, H., Kaafar, D. (2020). Who Let the \(\mathcal {DOGS}\) Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. In: Garcia-Alfaro, J., Navarro-Arribas, G., Herrera-Joancomarti, J. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2020 2020. Lecture Notes in Computer Science(), vol 12484. Springer, Cham. https://doi.org/10.1007/978-3-030-66172-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66172-4_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66171-7

  • Online ISBN: 978-3-030-66172-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics