Filters








982 Hits in 4.6 sec

Anr-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

Keita Emura, Atsuko Miyaji, Kazumasa Omote
2014 Journal of Applied Mathematics  
Similarly, in revocable group signature schemes, if one knows (or guesses) the number of revoked users (sayr), then one may guess the reason behind such circumstances, and it may lead to harmful rumors  ...  To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.  ...  So, our main target is to propose a revocable group signature scheme with the property of hiding the number of revoked users 𝑟, which we call 𝑟-hiding revocable group signature.  ... 
doi:10.1155/2014/983040 fatcat:v2kwqx73knfnvglgvuxk5ecn5y

A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users [chapter]

Keita Emura, Atsuko Miyaji, Kazumasa Omote
2012 Lecture Notes in Computer Science  
Similarly, in revocable group signature schemes, if one knows (or guesses) the number of revoked users (say r), then one may guess the reason behind such circumstances, and it may lead to harmful rumors  ...  However, no previous revocation procedure can achieve to hide r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden.  ...  So, our main target is to propose a revocable group signature scheme with the property of hiding the number of revoked users r.  ... 
doi:10.1007/978-3-642-31912-9_13 fatcat:ehxc26sesbb6zp5qp5j7glluz4

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List [chapter]

Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai
2014 Lecture Notes in Computer Science  
However, all previous revocable group signatures require at least O(r)-size revocation list, where r is the number of revoked users.  ...  This property has not been achieved in the recent scalable revocable group signature schemes, and seems to be of independent interest.  ...  We thank the members of Shin-Akarui-Angou-Benkyou-Kai and Prof. Toru Nakanishi for their helpful comments.  ... 
doi:10.1007/978-3-319-07536-5_25 fatcat:6fzth5qph5amrod4sdoepyt64e

Efficient Group Signature Scheme without Pairings [article]

Ke Gu, Bo Yin
2018 IACR Cryptology ePrint Archive  
In this paper, we present an efficient group signature scheme without pairings under the model of verifier-local revocation, which is based on the modified EDL signature (first proposed by D.  ...  Also, we give a formal security model for group signature and prove that the proposed scheme has the properties of traceability and anonymity.  ...  [20] proposed an γ-hiding revocable group signature scheme in the random oracle model. Because their scheme introduces the notion of attributes, their scheme is enough complex and inefficient.  ... 
dblp:journals/iacr/GuY18 fatcat:2g3gtzheufcwtnx6sdgx4z34ay

Protego: A Credential Scheme for Permissioned Blockchains (Extended Version) [article]

Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez-Kempner
2022 IACR Cryptology ePrint Archive  
(CANS, 2021) was proposed to include revocation, auditability, and to gain privacy for users.  ...  The current Idemix implementation in Hyperledger Fabric (v2.4) only supports a fixed set of attributes, it does not support revocation features, nor does it support anonymous endorsement of transactions  ...  , we construct an adversary B that uses A to break the binding property of the revocation accumulator RevAcc.  ... 
dblp:journals/iacr/ConnollyDLP22 fatcat:y55jb46iibhfnoxb2qkkqejysi

List signature schemes

Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré
2006 Discrete Applied Mathematics  
A group signature scheme allows group members to issue signatures on behalf of the group, while hiding for each signature which group member actually issued it.  ...  We introduce the concept of list signatures as a variant of group signatures which sets a limit on the number of signatures each group member may issue.  ...  a user i and the group manager after which the user becomes a member of the group, legally bound by its own signature using an existing PKI; a Revoke protocol that the group manager can use to revoke  ... 
doi:10.1016/j.dam.2005.08.003 fatcat:aphxolv375byjggx6uacqhwife

On the Security of A Group Signature Scheme

Jianhong Zhang, Qin Geng
2008 2008 IEEE International Conference on Networking, Sensing and Control  
Recently, based on the work of Camenisch and Lysyanskaya, which is known to be the most efficient scheme so far, E.Y.Choi et.al propose an efficient group signature scheme with member revocation at TrustBus  ...  As a special digital signature, a group signature scheme allows a group member to sign message on behalf of the group in an anonymous and unlinkability way, In case of a dispute, the group manager can  ...  In 2005, E.Y.Choi [3] et al presents an efficient group signature scheme with member revocation based on the work of Camenisch and Lysyanskaya [12] .  ... 
doi:10.1109/icnsc.2008.4525420 dblp:conf/icnsc/ZhangG08a fatcat:2c6kp6xswndjhbfmpoc4sl4434

Lattice-Based Group Signature Scheme with Verifier-Local Revocation [chapter]

Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
2014 Lecture Notes in Computer Science  
Support of membership revocation is a desirable functionality for any group signature scheme.  ...  In comparison with existing lattice-based group signatures, our scheme has several noticeable advantages: support of membership revocation, logarithmicsize signatures, and weaker security assumption.  ...  The revocation check, i.e., the check against c (k) 0 in the case Ch (k) = 2, runs in linear time in the number of revoked users, as it seems unavoidable for secure VLR group signature schemes.  ... 
doi:10.1007/978-3-642-54631-0_20 fatcat:yiseljppnbewheta3in2jc67wq

Certificate Management Scheme for VANETs Using Blockchain Structure

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
The centralized certificate management, especially resulting in the delay of the revocation process, harms the nodes of VANETs.  ...  Moreover, this paper presents extended privacy for the participants of the voting process using ring signatures.  ...  For instance, even though group signatures [36] which share some features of ring signatures also provide user anonymity, an authority can cancel the user anonymity and identify the user.  ... 
doi:10.3390/cryptography6020020 fatcat:t55o5epttrfs3bovqq2tlfd6by

An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation [chapter]

Keita Emura, Atsuko Miyaji, Kazumasa Omote
2010 Lecture Notes in Computer Science  
There are many cryptographic schemes with anonymity, such as group signatures. As one important property, anonymity revocation has been introduced.  ...  ., the labor environment may not be good, and so on. To avoid such harmful rumors, in this paper, we propose an Anonymous Designated Verifier Signature (ADVS) scheme with revocation.  ...  Acknowledgements The authors would like to thank anonymous reviewers of ProvSec 2010 for their invaluable comments.  ... 
doi:10.1007/978-3-642-16280-0_12 fatcat:phok3jcg3vg6rayzi67y23ryqm

A Collaboratively Hidden Location Privacy Scheme for VANETs

Ying Mei, Guozhou Jiang, Wei Zhang, Yongquan Cui
2014 International Journal of Distributed Sensor Networks  
In this paper, we address the problem of privacy and liability in VANETs. We propose a scheme that provides location privacy by utilizing a variant of ring signature.  ...  It allows a vehicle to form a ring arbitrarily with nearby vehicles and sign its messages anonymously, so that it can hide itself in the surrounding vehicles.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2014/473151 fatcat:mgcjjzyxx5dzxop22vn3cf7qv4

Group Signature Schemes with Membership Revocation for Large Groups

T. NAKANISHI
2006 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
However, signing and/or verification of some existing schemes have computational costs of O(R), where R is the number of revoked members.  ...  Model We show a model of group signature scheme with membership revocation [12] .  ...  However, in the schemes [6, 2, 4] , signing and/or verification requires a computation with O(R) complexity, where R is the number of revoked members.  ... 
doi:10.1093/ietfec/e89-a.5.1275 fatcat:l2bcqska7baqjdh6mq2rm5kkpu

Group Signature Schemes with Membership Revocation for Large Groups [chapter]

Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki
2005 Lecture Notes in Computer Science  
However, signing and/or verification of some existing schemes have computational costs of O(R), where R is the number of revoked members.  ...  Model We show a model of group signature scheme with membership revocation [12] .  ...  However, in the schemes [6, 2, 4] , signing and/or verification requires a computation with O(R) complexity, where R is the number of revoked members.  ... 
doi:10.1007/11506157_37 fatcat:itklggxxabbuhn277nxyivvjpi

Conversion Schemes for Unlinkable Signatures That Include Revocable Unlinkability

K. CHIDA
2006 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
This paper introduces the concept of "revocable unlinkability" for unlinkable anonymous signatures and proposes a generalized scheme that modifies the signatures to include revocable unlinkability.  ...  Noteworthy is that the identifier of the signer is kept secret from the manager. In addition, examples are presented in which the proposed scheme is applied to existing group/ring signatures.  ...  Acknowledgement The author would like to thank the anonymous referees for  ... 
doi:10.1093/ietfec/e89-a.1.90 fatcat:lonohdvapngmxbhrmkkc2jm6zq

A Fully-Functional Group Signature Scheme over Only Known-Order Group [chapter]

Atsuko Miyaji, Kozue Umeda
2004 Lecture Notes in Computer Science  
Furthermore, unfortunately, it does not provide the function of revocation. In this paper, we propose the group signature scheme based on only publicly-known-order groups.  ...  Previous group signature schemes use an RSA signature based membership certificate and a signature based on a proof of knowledge(SPK) in order to prove the possession of a valid membership certificate.  ...  The signature size and the cost of signature generation does not depend on the number of revoked members, but the cost of verification depends on the number of revoked members.  ... 
doi:10.1007/978-3-540-24852-1_12 fatcat:lx53e4vycvdj3cp6aknpb2ei7a
« Previous Showing results 1 — 15 out of 982 results