An Exploration of Group and Ring Signatures

نویسنده

  • Sarah Meiklejohn
چکیده

Group signatures are a modern cryptographic primitive that allow a member of a specific group (e.g., “the White House staff” or “employees of Corporation X that publish press releases”) to sign messages on behalf of the group as a whole; i.e., without revealing their individual identities and thus providing them with a certain degree of anonymity and privacy. They have quite a number of potential applications (and in fact have been incorporated into the latest version of the Trusted Platform Module, or TPM), and are still an active area of research. In this work, we explore group signatures and the many variations that have been considered since their original introduction in 1991 by Chaum and van Heyst. We furthermore discuss the basic primitives used to realize group signatures and their numerous definitions of security; we then outline a generic group signature construction (due to Bellare, Micciancio, and Warinschi) that achieves the strongest notion of security and give intuition for how it does this. As a complement to group signatures we also consider ring signatures, in which users can enjoy anonymity properties similar to those of group signatures but can form their groups in an adhoc manner; i.e., without any setup or consent required from the other members of these “ad-hoc groups,” or rings. We again consider the different notions of security for ring signatures, as well as the different variations on the original concept introduced by Rivest, Shamir, and Tauman in 2001. We then outline a ring signature construction (due to Shacham and Waters) that achieves the strongest notion of security, and conclude with a discussion of open problems for both group and ring signatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of blind massive sulphide deposit signatures in the calcrete layers as a geochemical barrier: A case study of Areachap, Kantienpan and Copperton deposits

The trace element contents on the surface originated from mineralization would depend to the thickness of the calcrete layer above the ore deposit on the surface. A very thick layer of calcrete may not allow for much dispersion of the elements of interest in the surface. These elements may be concentrated in non-magnetic and magnetic part of calcrete. Based on the current research, mineralogica...

متن کامل

Short Accountable Ring Signatures Based on DDH

Ring signatures and group signatures are prominent cryptographic primitives offering a combination of privacy and authentication. They enable individual users to anonymously sign messages on behalf of a group of users. In ring signatures, the group, i.e. the ring, is chosen in an ad hoc manner by the signer. In group signatures, group membership is controlled by a group manager. Group signature...

متن کامل

Accountable Ring Signatures: A Smart Card Approach

Ring signatures are an important primitive for protecting signers’ privacy while ensuring that a signature in question is indeed issued by some qualified user. This notion can be seen as a generalization of the well-known notion of group signatures. A group signature is a signature such that a verifier can establish its validity but not the identity of the actual signer, who can nevertheless be...

متن کامل

Nitration Ortho Dihydroxyl Benzene (Catechol) Using Bismuth Nitrate on the Solid Phase Montmorillonite

Nitro catechols via 2 hydroxyl group and a nitro group have a wide range of functions including reagents form stable complexes with more than 40 elements in the fields of analytical chemistry, biochemistry, coordination chemistry, environmental chemistry, atrium exploration, organic chemistry, pharmacy, etc. Moreover, the nitro to amine recovery has a potential function in different fields. In ...

متن کامل

A traceable optimistic fair exchange protocol in the standard model

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011