A Group Signature Scheme with Distributed Group Management — An Application of Threshold Encryption
نویسنده
چکیده
We present group signature schemes that distribute group management using threshold encryption. To our best knowledge, we are the first to construct and analyze such schemes in detail. The threshold encryption schemes we employ to distribute group management are based on Shamir secret sharing and monotone span programs. We analyze our schemes not only in a static scenario, but also under group dynamics.
منابع مشابه
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability
In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among nmanagers without requiring any interaction. This ensures that only the participation of all tracing managers permits tracing a signature, which reduces the trust placed in a single tracing manager. The threshold variant follows eas...
متن کاملA General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System
Based on ElGamal system, a group-oriented threshold signature and authenticated encryption scheme was put forward. After being signed by a signer group employing ) , ( n t threshold signature scheme, the message m was transmitted to a particular verifier group, and then the signature was verified through the cooperation of k ones from the verifier group with l members. Similarly, a general auth...
متن کاملAll Sail, No Anchor III: Risk Aggregation and Time's Arrow
Traversing middleboxes with the host identity protocol p. 17 An investigation of unauthorised use of wireless networks in Adelaide, South Australia p. 29 An efficient solution to the ARP cache poisoning problem p. 40 On Stern's attack against secret truncated linear congruential generators p. 52 On the success probability of [chi][superscript 2]-attack on RC6 p. 61 Solving systems of differenti...
متن کاملVerifiable Encryption and Applications to Group Signatures and Signature Sharing
We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We show a new application of verifiable encryption to group signatures with separability, these schemes do not need special purpose keys but can work with a wide range of signature...
متن کاملHow to Convert any Digital Signature Scheme into a Group Signature Scheme
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. In this paper we show, how any digital signature scheme can be converted into a group signature scheme. This solves an open problem posed by Chaum and van Heijst. To obtain this result, the encrypted identity of the signer is signed together with the message. The c...
متن کامل