Skip to main content
Log in

Hierarchical group signature with verifier-local revocation revisited

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Chaum D, van Heyst E. Group signatures. In: Proceedings of Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, 1991. 257–265

  2. Trolin M, Wikström D. Hierarchical group signatures. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, Lisbon, 2005. 446–458

  3. Hou L, Liu R, Qiu T, et al. Hierarchical group signatures with verifier-local revocation. In: Proceedings of the 20th International Conference on Information and Communications Security, Lille, 2018. 271–286

  4. Boneh D, Shacham H. Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, 2004. 168–177

  5. Bellare M, Boldyreva A, Desai A, et al. Key-privacy in public-key encryption. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, 2001. 566–582

  6. Ajtai M. Generating hard instances of lattice problems (extended abstract). In: Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, 1996. 99–108

  7. Gordon S D, Katz J, Vaikuntanathan V. A group signature scheme from lattice assumptions. In: Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2010. 395–412

  8. Langlois A, Ling S, Nguyen K, et al. Lattice-based group signature scheme with verifier-local revocation. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, 2014. 345–361

  9. Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, 2018. 197–206

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61872359, 61936008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongdai Lin.

Supplementary File

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hou, L., Lin, D. & Liu, R. Hierarchical group signature with verifier-local revocation revisited. Sci. China Inf. Sci. 65, 189103 (2022). https://doi.org/10.1007/s11432-019-2709-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2709-7

Navigation