1999
DOI: 10.1007/3-540-48405-1_27
|View full text |Cite
|
Sign up to set email alerts
|

Separability and Efficiency for Generic Group Signature Schemes

Abstract: A cryptographic protocol possesses separability if the participants can choose their keys independently of each other. This is advantageous from a key-management as well as from a security point of view. This paper focuses on separability in group signature schemes. Such schemes allow a group member to sign messages anonymously on the group's behalf. However, in case of this anonymity's misuse, a trustee can reveal the originator of a signature. We provide a generic fully separable group signature scheme and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
95
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 129 publications
(96 citation statements)
references
References 45 publications
0
95
0
Order By: Relevance
“…Such kind of proofs are intensively used in several schemes: electronic cash systems [7], group signatures [11], publicly verifiable secret sharing schemes [17,4], and other zero-knowledge protocols (e.g. [13,10]).…”
Section: Introductionmentioning
confidence: 99%
“…Such kind of proofs are intensively used in several schemes: electronic cash systems [7], group signatures [11], publicly verifiable secret sharing schemes [17,4], and other zero-knowledge protocols (e.g. [13,10]).…”
Section: Introductionmentioning
confidence: 99%
“…We use several standard results for proving statements about discrete logarithms, such as (1) a proof of knowledge of a discrete logarithm modulo a prime [33] or a composite [26,24], (2) a proof of knowledge of equality of representation modulo two (possibly different) prime [19] or composite [14] moduli, (3) a proof that a commitment opens to the product of two other committed values [13,16,6], and (4) a proof of the disjunction or conjunction of any two of the previous [22]. These composite-based protocols are secure under Strong RSA and the prime-based ones under the discrete logarithm assumption.…”
Section: Pedersen and Fujisaki-okamoto Commitmentsmentioning
confidence: 99%
“…Subsequently it has been studied extensively and used in a variety of cryptographic applications (for e.g. [17,12,8,2,7,3,28]). The second assumption we make is a Knowledge-of-Exponent Assumption (KEA).…”
Section: Related Workmentioning
confidence: 99%
“…Consider the following mapping: first map the given binary string unambiguously to a sufficiently large integer t (but not larger than 2 poly(k) ). 8 Then map it to the smallest prime number greater than t 2 .…”
Section: B Mapping Strings To Primesmentioning
confidence: 99%