skip to main content
10.1145/1046290.1046342acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

An ID-based group signature

Published: 14 November 2004 Publication History

Abstract

Suppose that there are n departments in a company Ω and any dept. has the right to sign a message on behalf of the company. The group signature made by the dept. should be agreed by the members whose number is over the threshold. The Receiver can verify the validity of the signature but can't distinguish which dept. the signature comes from. When the dispute occurs, only the Authority can "open" the group signature to distinguish where the signature comes from. Motivated by this consideration, with the combination of vector space secret sharing and bilinear pairing, a new group signature is presented in this paper. The member can be added or deleted after the scheme founded and the public key length is independent. The "open" process in the presented group signature is realized by subliminal channel.

References

[1]
Chaum, D. and Heyst, V. E. Group signatures. Processdings of EUROCRYPT'91. Lecture Notes in Computer Science. Springer Verlag, 1991, 547: 257--265]]
[2]
Camenish, J and Stadler, M. Efficient group signatures for large groups. Proceedings of CRYPTO'97, Lecture Notes in Computer Science. Springer-Verlag, 1997, 1296:410--424]]
[3]
Chen, L and Pedersen, T. New group signature schemes. Proceedings of EUROCRYPT'94, Lecture Notes in Computer Science. Springer-Verlag, 1995, 950:171--181]]
[4]
Padro, C and Saez, G. Detection of Cheaters in Vector Space Secret Sharing Schemes. Desings, codes and Cryptography, 1999, 16(1). 75--85]]
[5]
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. Advances in Cryptology -- Asiacrypt'2001, Lecture Notes in Computer Science 2248, Springer-Verlag (2002), pp. 514--532]]
[6]
L. Ham, G. Gong. Digital signature with a subliminal channels. IEE Proc.-Compute. Digit. Tech. 1997. 144(6). 387--3]]

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
InfoSecu '04: Proceedings of the 3rd international conference on Information security
November 2004
266 pages
ISBN:1581139551
DOI:10.1145/1046290
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 November 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ID-based
  2. group signature
  3. secret sharing
  4. subliminal channel

Qualifiers

  • Article

Conference

INFOSECU04
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 301
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media