Group Signature with Signer-Controlled Opening Capability: Separate Token Generator

  • Sungwook Eom
  • Jun-Ho HuhEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)


One of the most important cytological authorization methods to protect privacy is group signature method. Verifiers have limited information of the signers that gives the limited certainties that the signer is from the group while the specific identities of the signers are still concealed. In a group signature method, the openers can reveal the anonymous signers. However, the point that opener is always authorizable to check the signer’s identification without consent is useful to manage malice actions but is also doubtful for the signers because of the risk of the privacy exposure. This paper proposes a resolution for the signer’s anxiety. It tells that the signer has a right to create a token whenever they want to open their identity and only the opener with the token from the signer have access to the signer’s identification.


Group signature Anonymous signature Opening capability Privacy 


  1. 1.
    Chaum, D., van Heyst, E.: Group Signatures, pp. 257–265. EUROCRYPT, Englewood Cliffs (1991)Google Scholar
  2. 2.
    Hwang, J.Y., Eom, S., Chang, K.-Y., Lee, P.J., Nyang, D.: Anonymity-based authenticated key agreement with full binding property. WISA, pp. 177–191 (2012)Google Scholar
  3. 3.
    Sakai, Y., Emura, K., Hanaoka, G., Kawai, Y., Matsuda, T., Omote, K.: Group signatures with message-dependent opening, pairing, pp. 270–294 (2012)Google Scholar
  4. 4.
    Ohara, K., Sakai, Y., Emura, K., Hanaoka, G.: A group signature scheme with unbounded message-dependent opening. In: ASIACCS, pp. 517–522 (2013)Google Scholar
  5. 5.
    Eom, S., Lee, E., Lee, P.J.: Anonymous signature with signer-controlled opening capability. In: CISC-W (2013)Google Scholar
  6. 6.
    Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions. In: EUROCRYPT, pp. 614–629 (2003)Google Scholar
  7. 7.
    Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)Google Scholar
  8. 8.
    Huh, J.-H.: Smart grid test bed using OPNET and power line communication, pp. 1–425. IGI Global, USA (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Electrical EngineeringPOSTECHPohangRepublic of Korea
  2. 2.Department of SoftwareCatholic University of PusanBusanRepublic of Korea

Personalised recommendations