Hierarchical Identities from Group Signatures and Pseudonymous Signatures

  • Julien Bringer
  • Hervé Chabanne
  • Roch Lescuyer
  • Alain Patey
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9100)

Abstract

The use of group signatures has been widely suggested for authentication with minimum disclosure of information. In this paper, we consider an identity management system, where users can access several group signatures, managed by different authorities. These authorities follow a hierarchy that impacts key issuing and revocation, but we still enforce that anonymity within a group is preserved towards authorities of other groups. We thus define cross-unlinkable hierarchical group signatures, for which we give a generic instantiation based on VLR group signatures and domain-specific pseudonymous signatures.

References

  1. 1.
    Ateniese, G., Tsudik, G.: Some open issues and new directions in group signatures. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 196–211. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Bender, J., Dagdelen, Ö., Fischlin, M., Kügler, D.: Domain-specific pseudonymous signatures for the German identity card. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 104–119. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  4. 4.
    Benjumea, V., Choi, S.G., Lopez, J., Yung, M.: Fair traceable multi-group signatures. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 231–246. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 168–177. ACM (2004)Google Scholar
  6. 6.
    Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Financial Cryptography and Data Security (FC) (2014)Google Scholar
  7. 7.
    Bringer, J., Chabanne, H., Patey, A.: An application of a group signature scheme with backward unlinkability to biometric identity management. In: Samarati et al. [20], pp. 421–425 (2012)Google Scholar
  8. 8.
    Bringer, J., Chabanne, H., Patey, A.: Cross-unlinkable hierarchical group signatures. In: De Capitani di Vimercati, S., Mitchell, C. (eds.) EuroPKI 2012. LNCS, vol. 7868, pp. 161–177. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  9. 9.
    Bringer, J., Chabanne, H., Patey, A.: Collusion-resistant domain-specific pseudonymous signatures. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 649–655. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  10. 10.
    Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: An application of the Boneh and Shacham group signature scheme to biometric authentication. In: Matsuura, K., Fujisaki, E. (eds.) IWSEC 2008. LNCS, vol. 5312, pp. 219–230. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    Bringer, J., Patey, A.: VLR group signatures - how to achieve both backward unlinkability and efficient revocation checks. In: Samarati et al. [20], pp. 215–220 (2012)Google Scholar
  12. 12.
    BSI: advanced security mechanisms for machine readable travel documents. Part 2 extended access control version 2 (EACv2), password authenticated connection establishment (PACE), and restricted identification (RI). Technical report TR-03110-2, BSI, version 2.10, March 2012Google Scholar
  13. 13.
    Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  14. 14.
    Chen, L., Li, J.: VLR group signatures with indisputable exculpability and efficient revocation. In: Elmagarmid, A.K., Agrawal, D. (eds.) SocialCom/PASSAT, pp. 727–734. IEEE Computer Society (2010)Google Scholar
  15. 15.
    Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201–217. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  16. 16.
    Khader, D.: Attribute based group signature with revocation. IACR Cryptology ePrint Archive 2007, 241 (2007)Google Scholar
  17. 17.
    Khader, D.: Attribute based group signatures. IACR Cryptology ePrint Archive 2007, 159 (2007)Google Scholar
  18. 18.
    Kim, S., Park, S., Won, D.: Group signatures for hierarchical multigroups. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  19. 19.
    Patey, A.: Techniques cryptographiques pour l’authentification et l’identification biométriques respectant la vie privée. Ph.D. thesis, Télécom ParisTech (2014)Google Scholar
  20. 20.
    Samarati, P., Lou, W., Zhou, J. (eds.): SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24–27, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress (2012), July 2012Google Scholar
  21. 21.
    Trolin, M., Wikström, D.: Hierarchical group signatures. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 446–458. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Julien Bringer
    • 1
  • Hervé Chabanne
    • 1
    • 2
    • 3
  • Roch Lescuyer
    • 1
  • Alain Patey
    • 1
    • 2
    • 3
  1. 1.MorphoIssy-les-MoulineauxFrance
  2. 2.Télécom ParisTechIdentity and Security Alliance (The Morpho and Télécom ParisTech Research Center)ParisFrance
  3. 3.Identity and Security Alliance (The Morpho and Télécom ParisTech Research Center)ParisFrance

Personalised recommendations