2015
DOI: 10.1007/978-3-319-16295-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability

Abstract: Abstract. In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among n managers without requiring any interaction. This ensures that only the participation of all tracing managers permits tracing a signature, which reduces the trust placed in a single tracing manager. The threshold variant follows easily from our definitions and constructions. Our model offers strong security requirements. Our second contr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 49 publications
0
18
0
Order By: Relevance
“…In distributed tag-based encryption [4,15], the (tag-based) ciphertexts can only be decrypted if all n decryption servers compute their decryption shares correctly. In the threshold variant, at least κ out of n decryption servers must compute their decryption shares correctly for the decryption to succeed.…”
Section: Robust Non-interactive Distributed/threshold Tag-based Encrymentioning
confidence: 99%
See 2 more Smart Citations
“…In distributed tag-based encryption [4,15], the (tag-based) ciphertexts can only be decrypted if all n decryption servers compute their decryption shares correctly. In the threshold variant, at least κ out of n decryption servers must compute their decryption shares correctly for the decryption to succeed.…”
Section: Robust Non-interactive Distributed/threshold Tag-based Encrymentioning
confidence: 99%
“…Besides the original scheme given in [15], we also use a second variant of the scheme in [15] (shown in Fig. 6) where we transpose the groups in which the public key and the ciphertext lie.…”
Section: Robust Non-interactive Distributed/threshold Tag-based Encrymentioning
confidence: 99%
See 1 more Smart Citation
“…Instead, we can distribute the powers of the tracing agent. In a group signature scheme with a distributed tracing agent, several agents need to cooperate before the identity of the signer can be recovered [9]. As long as a decent subset of the tracing agents is trusted, the anonymity of the user's identities is guaranteed.…”
Section: Decision Primitivesmentioning
confidence: 99%
“…After the introduction [14], different variants of GS schemes were proposed (collision-resistant GS scheme [19], sign-and-encrypt-and-prove based GS [20], traceable signatures [15,34,35], GS with verifier local revocation [16], GS from blind signatures [36], traceable signatures in standard model [37], group signatures in standard model [38], GS with controllable linkability [39,40], GS with distributed traceability [41], GS with dynamic accumulators [42]). Kiayias et al (traceable signatures [15]) first introduced internal tracing algorithms (trapdoors) to efficiently trace and revoke the anonymity of misbehaving members.…”
Section: Revocation In Group Signaturesmentioning
confidence: 99%