skip to main content
10.1145/1179529.1179541acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Using group signatures for identity management and its implementation

Published: 03 November 2006 Publication History

Abstract

We discuss the merits of using group signature technology in Identity Management. We propose a novel model of group signature scheme and introduce a new entity called User-Revocation manager. User-Revocation manager plays an independent role regarding user revocation which was previously covered by either Group manager or Issuing manager. We extend the idea of the Camenisch-Groth scheme and present an efficient revocation scheme where the cost of user revocation is smaller than that of the Camenisch-Groth scheme. We also discuss the details of our implementation.

References

[1]
Ateniese, G., Camenisch, J., Joye, M., and Tsudik, G. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology -- CRYPTO 2000 (Santa Barbara, California, USA, August 2000), M. Bellare, Ed., vol. 1880 of Lecture Notes in Computer Science Springer-Verlag, pp.255--270.]]
[2]
BARIć, N., AND PFIZMANN, B. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT '97 (Konstanz, Germany, May 1997), W. Fumy, Ed., vol. 1233 of Lecture Notes in Computer Science Springer-Verlag, pp. 480--494.]]
[3]
Boneh, D. The decision Diffie-Hellman problem. In Algorithmic Number Theory Symposium (ANTS '98) (1998), vol. 1423 of Lecture Notes in Computer Science Springer-Verlag, pp. 48--63.]]
[4]
Boneh, D., Boyen, X., and Shacham, H. Short group signatures.In Advances in Cryptology -- CRYPTO 2004 (Santa Barbara, California, USA, August 2004), M. K. Franklin, Ed., vol. 3152 of Lecture Notes in Computer Science Springer-Verlag, pp.45--55.]]
[5]
Camenisch, J., and Groth, J. Group signatures: Better efficiency and new theoretical aspects. In Security in Communication Networks (SCN2004) (2004), vol. 3352 of Lecture Notes in Computer Science Springer, pp. 120--133.]]
[6]
Camenisch, J., and Michels, M. Separability and efficiency for generic group signature schemes (Extended abstract).In Advances in Cryptology--CRYPTO '99 (Santa Barbara,California, USA, August 1999), M. Wiener, Ed.,vol. 1666 of Lecture Notes in Computer Science Springer-Verlag, pp. 413--430.]]
[7]
Chaum, D., and van Heijst, E. Group Signatures. In Advances in Cryptology -- EUROCRYPT '91 (Brighton, UK, April 1991), D. Davies, Ed., vol.547 of Lecture Notes in Computer Science Springer-Verlag, pp. 257--265.]]
[8]
Furukawa, J., and Imai, H. An efficient group signature scheme from bilinear maps.In Australasian Conference on Information Security and Privacy (ACISP2005) (2005),vol.3574 of Lecture Notes in Computer Science Springer, pp. 455--467.]]
[9]
GMP (The GNU MP Bignum Library) http://www.swox.com/gmp/.]]
[10]
Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. Handbook of Applied Cryptography CRC Press, 1996.]]
[11]
Teranishi, I., Furukawa, J., and Sako, K. k -Times anonymous authentication (extended abstract). In Advances in Cryptology -- ASIACRYPT 2004 (Jeju Island, Korea, December 2004), P. J. Lee, Ed., vol.3329 of Lecture Notes in Computer Science Springer-Verlag, pp. 308--322.]]
[12]
Teranishi, I. A group signature -Insecurity of previous schemes, and improvement of a previous definition, and proposition of a scheme. In ISEC (March,2005), in Japanese.]]

Cited By

View all
  • (2024)An Identity Management System Using Group Signatures with Message-Dependent Opening2024 19th Asia Joint Conference on Information Security (AsiaJCIS)10.1109/AsiaJCIS64263.2024.00017(40-47)Online publication date: 13-Aug-2024
  • (2023)On Efficiency and Usability of Group Signatures on Smartphone and Single-board PlatformsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605015(1-9)Online publication date: 29-Aug-2023
  • (2023)SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact InformationE-Business and Telecommunications10.1007/978-3-031-45137-9_1(1-19)Online publication date: 30-Sep-2023
  • Show More Cited By

Index Terms

  1. Using group signatures for identity management and its implementation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DIM '06: Proceedings of the second ACM workshop on Digital identity management
      November 2006
      88 pages
      ISBN:1595935479
      DOI:10.1145/1179529
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 November 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. group signature
      2. identity management
      3. implementation
      4. user revocation

      Qualifiers

      • Article

      Conference

      CCS06
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 16 of 34 submissions, 47%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An Identity Management System Using Group Signatures with Message-Dependent Opening2024 19th Asia Joint Conference on Information Security (AsiaJCIS)10.1109/AsiaJCIS64263.2024.00017(40-47)Online publication date: 13-Aug-2024
      • (2023)On Efficiency and Usability of Group Signatures on Smartphone and Single-board PlatformsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605015(1-9)Online publication date: 29-Aug-2023
      • (2023)SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact InformationE-Business and Telecommunications10.1007/978-3-031-45137-9_1(1-19)Online publication date: 30-Sep-2023
      • (2021)A Privacy-Preserving Enforced Bill Collection System using Smart Contracts2021 16th Asia Joint Conference on Information Security (AsiaJCIS)10.1109/AsiaJCIS53848.2021.00018(51-60)Online publication date: Aug-2021
      • (2021)Post-Quantum Era Privacy Protection for Intelligent InfrastructuresIEEE Access10.1109/ACCESS.2021.30622019(36038-36077)Online publication date: 2021
      • (2020)A Revocable Group Signature Scheme with Scalability from Simple AssumptionsIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2019CIP0004E103.A:1(125-140)Online publication date: 1-Jan-2020
      • (2020)Blockchain-based accountability for multi-party oblivious RAMJournal of Parallel and Distributed Computing10.1016/j.jpdc.2019.10.005137:C(224-237)Online publication date: 1-Mar-2020
      • (2019)Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329824(515-528)Online publication date: 2-Jul-2019
      • (2018)Evaluation of anonymous digital signatures for privacy-enhancing mobile applicationsInternational Journal of Security and Networks10.1504/IJSN.2018.09064013:1(27-41)Online publication date: 1-Jan-2018
      • (2017)Secure and privacy preserving group signature scheme with verifier local revocation2017 International Conference on Computational Intelligence in Data Science(ICCIDS)10.1109/ICCIDS.2017.8272673(1-5)Online publication date: Jun-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media