Co-operatively Formed Group Signatures

  • Greg Maitland
  • Colin Boyd
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2271)

Abstract

Group signatures and their applications have received considerable attention in the literature in recent times. Substantial gains have been made with respect to designing provably secure and efficient schemes. In practice, as with all signature schemes, deploying group signature schemes requires the group member’s signing keys to be both physically and electronically secure from theft. Smartcards or similar devices are often offered as a solution to this problem.

We consider the possibility of co-operatively forming group signatures so as to balance the processing load between a modestly performed secure device and a much more powerful workstation. The constructions are based on the observation that several recent group signature schemes have adopted a structure which utilises two values in signature creation - a private signing key and a group membership certificate. We describe a co-operative group signature scheme based on a recently proposed scheme as well as a ‘wallet with observer’ variant.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    G. Ateniese and G. Tsudik. Some open issues and new directions in group signatures. In Matthew Franklin, editor, Financial cryptography: Third International Conference, FC’ 99, Anguilla, British West Indies, February 22–25, 1999: proceedings, volume 1648 of Lecture Notes in Computer Science, pages 196–211, Berlin, Germany / Heidelberg, Germany / London, UK / etc., 1999. Springer-Verlag.Google Scholar
  2. 2.
    Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Mihir Bellare, editor, Advances in Cryptology-CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255–270. Springer-Verlag, 20–24 August 2000.Google Scholar
  3. 3.
    Giuseppe Ateniese, Marc Joye, and Gene Tsudik. On the difficulty of coalitionresistance in group signature schemes. In Second Conference Security in Communication Networks (SCN’ 99), 16–17 September 1999.Google Scholar
  4. 4.
    Giuseppe Ateniese and Gene Tsudik. Group signatures á la carte. In Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 848–849, N.Y., January 17–19 1999. ACM-SIAM.Google Scholar
  5. 5.
    Stefan Brands. Untraceable off-line cash in wallets with observers. In Douglas R. Stinson, editor, Advances in Cryptology—CRYPTO’ 93, volume 773 of Lecture Notes in Computer Science, pages 302–318. Springer-Verlag, 22–26 August 1993.CrossRefGoogle Scholar
  6. 6.
    J. L. Camenisch and M. A. Stadler. Efficient group signature schemes for large groups. In Jr. Burton S. Kaliski, editor, Advances in Cryptology—CRYPTO’ 97, volume 1294 of Lecture Notes in Computer Science, pages 410–424. Springer-Verlag, 17–21 August 1997.CrossRefGoogle Scholar
  7. 7.
    Jan Camenisch. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. PhD thesis, ETH, 1998. Reprinted as Vol. 2 of ETHSeries in Information Security an Cryptography, editied by Ueli Maurer, Hartung-Gorre Verlag, Konstanz, ISBN 3-89649-286-1.Google Scholar
  8. 8.
    Jan Camenisch and Markus Michels. A group signature scheme based on an RSAvariant. BRICS Report Series RS-98-27, University of Aarhus, November 1998.Google Scholar
  9. 9.
    D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology-EUROCRYPT 91, volume 547 of Lecture Notes in Computer Science, pages 257–265. Springer-Verlag, 8–11 April 1991.Google Scholar
  10. 10.
    D. Chaum and T. Pryds Pedersen. Wallet databases with observers. In Ernest F. Brickell, editor, Advances in Cryptology—CRYPTO’ 92, volume 740 of Lecture Notes in Computer Science, pages 89–105. Springer-Verlag, 1993, 16–20 August 1992.CrossRefGoogle Scholar
  11. 11.
    David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology: Proceedings of Crypto 82, pages 199–203. Plenum Press, New York and London, 1983, 23–25 August 1982.Google Scholar
  12. 12.
    L. Chen and T. P. Pedersen. New group signature schemes. In Alfredo De Santis, editor, Advances in Cryptology—EUROCRYPT 94, volume 950 of Lecture Notes in Computer Science, pages 171–181. Springer-Verlag, 1995, 9–12 May 1994.CrossRefGoogle Scholar
  13. 13.
    Ronald Cramer and Torben Pedersen. Improved privacy in wallets with observers. In Tor Helleseth, editor, Advances in Cryptology—EUROCRYPT 93, volume 765 of Lecture Notes in Computer Science, pages 329–343. Springer-Verlag, 1994, 23–27 May 1993.Google Scholar
  14. 14.
    A. Lysyanskaya and Z. Ramzan. Group blind digital signatures: A scalable solution to electronic cash. In R. Hirschfeld, editor, Financial Cryptography: Second International Conference, FC’ 98, volume 1465 of Lecture Notes in Computer Science, pages 184–197. Springer-Verlag, February 1998.Google Scholar
  15. 15.
    Greg Maitland and Colin Boyd. Fair electronic cash based on a group signature scheme. In Third International Conference on Information and Communications Security (ICICS 2001). Springer-Verlag, November 2001. To appear.Google Scholar
  16. 16.
    Toru Nakanishi, Toru Fujiwara, and Hajime Watanabe. A linkable group signature and its application to secret voting. PSJ Transactions, 40(7):3085–3096, 1999.MathSciNetGoogle Scholar
  17. 17.
    Toru Nakanishi and Yuji Sugiyama. Unlinkable divisible electronic cash. In E. Okamoto and J. Pieprzyk, editors, The Third International Workshop on Information Security (ISW2000), volume 1975 of Lecture Notes in Computer Science, pages 121–134, 2000.Google Scholar
  18. 18.
    Zulfikar Ramzan. Group blind digital signatures: Theory and applications. Master’s thesis, Department of Electrical Engineering and Computer Science, MIT, 1999.Google Scholar
  19. 19.
    Jacques Traoré. Group signatures and their relevance to privacy-protecting off-line electronic cash systems. In J. Pieprzyk, R. Safavi-Naini, and J. Seberry, editors, Australasian Conference on Information Security and Privacy (ACISP’99), volume 1587 of Lecture Notes in Computer Science, pages 228–243. Springer-Verlag, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Greg Maitland
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations