Skip to main content
Log in

Democratic group signatures with threshold traceability

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t − 1 group members.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chaum D, Heyst E. Group signatures [C] //Advances in Cryptology- EUROCRYPT 1991. Heidelberg: Springer-Verlag, 1991: 257–265.

    Chapter  Google Scholar 

  2. Bellare M, Micciancio D, Warinschi B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions [C] //Advances in Cryptology- EUROCRYPT 2003. Heidelberg: Springer-Verlag, 2003: 614–629.

    Chapter  Google Scholar 

  3. Manulis M. Democratic group signature on example of joint ventures [C] //ACM Symposium on Information, Computer and Communications Security- ASIACCS 2006. New York: ACM, 2006: 365.

    Chapter  Google Scholar 

  4. Manulis M, Sadeghi A, Schwenk J. Linkable democ-ratic group signatures [C] //Security Practice and Experience-ISPEC 2006. Heidelberg: Springer-Verlag, 2006: 187–201.

    Chapter  Google Scholar 

  5. Bresson E, Stern J. Proofs of knowledge for non-monotone discrete-log formulae and applications [C] //Information Security-ISC 2002. Heidelberg: Springer-Verlag, 2002: 272–288.

    Google Scholar 

  6. Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting [C] //Advances in Cryptology-CRYPTO 1999. Heidelberg: Springer-Verlag, 1999: 148–164.

    Google Scholar 

  7. Rivest R, Shamir A, Tauman Y. How to leak a secret [C] //Advances in Cryptology-ASIACRYPT 2001. Heidelberg: Springer-Verlag, 2001: 552–565.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang-xue Li  (李祥学).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 60703031, 60703004, 60673076, 60672068)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Xx., Qian, Hf. & Li, Jh. Democratic group signatures with threshold traceability. J. Shanghai Jiaotong Univ. (Sci.) 14, 98–101 (2009). https://doi.org/10.1007/s12204-009-0098-z

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-009-0098-z

Key words

CLC number

Navigation