Abstract
Group signatures allow any member of a potentially large group to sign on behalf of the group. Group signatures are anonymous and unlinkable for everyone with the exception of a designated group manager who can co-relate signatures and reveal the identity of the acp- tual signer. At the same time, no one (including a group manager) can misattribute a valid group signature. Group signatures are claimed to have many practical applications in e-commerce as well as in military and legal fields.
Despite some interesting and eclectic results, group signatures remain confined to academic literature. The focus of this paper is two-fold. First, it discusses certain issues that stand in the way of practical applications of group signatures and uses the example of on recent group signature scheme to illustrate certain problems. Second, this paper (informally) introduces some practical security services that can be constructed us- ing any group signature scheme. Sample realizations of these services are provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Boyd Digital Multi-signatures. Cryptography and Coding (H.J. Beker and F.C. Piper Eds.), Oxford University Press, 1989, pp 241–246.
M. Burmester and Y. Desmedt A secure and e_cient conference key distribution system. In Advances in Cryptology-EUROCRYPT, 1994.
J. Camenisch Efficient and generalized group signatures. In Advances in Cryptology-EUROCRYPT, 1997.
J. Camenisch and M. Stadler Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO, 1997.
D. Chaum and T. Pedersen Wallet databases with observers. In Advances in Cryptology-CRYPTO, 1992.
D. Chaum and E. van Heyst Group signatures. In Advances in Cryptology-EUROCRYPT, 1991.
L. Chen and T. Pedersen On the efficiency of group signatures providing information-theoretic anonymity. In Advances in Cryptology-EUROCRYPT, 1995.
A. Lysyanskaya and Z. Ramzan Group blind digital signatures. In Financial Cryptography Conference, 1998.
H. Petersen How to convert any digital signature scheme into a group signature scheme. In Security Protocols Workshop, 1997.
M. Steiner, G. Tsudik, and M. Waidner Diffie-hellman key distribution extended to groups. In ACM Conference on Computer and Communication Security, pages 31–37, March 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ateniese, G., Tsudik, G. (1999). Some Open Issues and New Directions in Group Signatures. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_15
Download citation
DOI: https://doi.org/10.1007/3-540-48390-X_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66362-1
Online ISBN: 978-3-540-48390-8
eBook Packages: Springer Book Archive