skip to main content
10.1145/2414456.2414470acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Verifier-local revocation group signatures with time-bound keys

Published: 02 May 2012 Publication History

Abstract

A prominent issue in group signatures is revoking a group member's signing capability. To solve this issue, the group manager can send revocation messages only to signature verifiers, known as group signatures with verifier-local revocation (VLR). In existing VLR designs, the cost of revocation check grows linearly with the size of revocation messages. This paper introduces time-bound keys into group signatures to reduce the size of revocation messages and speed up the revocation check. In the new notion, the secret key of each group member is associated with an expiration date, and verifiers can tell (at a constant cost) whether or not a group signature is produced using an expired key. Consequently, revocation messages only need to provide the information about group members revoked prematurely (e.g., due to key compromise) but not those with expired keys. This will lead to a significant saving on revocation check in situations where prematurely revoked members are only a small fraction of revoked members. Following this approach, we give two concrete designs of group signatures with VLR to demonstrate the trade-offs between efficiency and privacy.

Reference

[1]
Guomin Yang, Qiong Huang, Duncan S. Wong, and Xiaotie Deng. Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1): 168--174, 2010.

Cited By

View all
  • (2024)AnoPas: Practical anonymous transit pass from group signatures with time-bound keysJournal of Systems Architecture10.1016/j.sysarc.2024.103184153(103184)Online publication date: Aug-2024
  • (2024)Post-quantum secure group signature with verifier local revocation and backward unlinkabilityComputer Standards & Interfaces10.1016/j.csi.2023.10378288(103782)Online publication date: Mar-2024
  • (2023)Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the EdgeProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623111(3018-3032)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
May 2012
119 pages
ISBN:9781450316484
DOI:10.1145/2414456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2012

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ASIA CCS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)AnoPas: Practical anonymous transit pass from group signatures with time-bound keysJournal of Systems Architecture10.1016/j.sysarc.2024.103184153(103184)Online publication date: Aug-2024
  • (2024)Post-quantum secure group signature with verifier local revocation and backward unlinkabilityComputer Standards & Interfaces10.1016/j.csi.2023.10378288(103782)Online publication date: Mar-2024
  • (2023)Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the EdgeProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623111(3018-3032)Online publication date: 15-Nov-2023
  • (2023)Lattice-Based Group Signatures With Time-Bound Keys via Redactable SignaturesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326857418(2696-2708)Online publication date: 2023
  • (2023)An Anonymous Authentication With Received Signal Strength Based Pseudonymous Identities Generation for VANETsIEEE Access10.1109/ACCESS.2023.324469711(15637-15654)Online publication date: 2023
  • (2023)A privilege-constrained sanitizable signature scheme for e-health systemsJournal of Systems Architecture10.1016/j.sysarc.2023.102939142(102939)Online publication date: Sep-2023
  • (2023)A Novel Group Signature Scheme with Time-Bound Keys for BlockchainWeb Information Systems and Applications10.1007/978-981-99-6222-8_42(501-512)Online publication date: 9-Sep-2023
  • (2023)SoK: Anonymous CredentialsSecurity Standardisation Research10.1007/978-3-031-30731-7_6(129-151)Online publication date: 7-Apr-2023
  • (2022)Time-Enabled and Verifiable Secure Search for Blockchain-Empowered Electronic Health Record Sharing in IoTSecurity and Communication Networks10.1155/2022/11038632022(1-15)Online publication date: 13-Dec-2022
  • (2022)Efficient group signature scheme using latticesInternational Journal of Information Technology10.1007/s41870-022-00891-314:4(1845-1854)Online publication date: 22-Feb-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media