Abstract
Two provably secure group identification schemes are presented in this report: 1) we extend De Santis, Crescenzo and Persiano’s (SCP) anonymous group identification scheme to the discrete logarithm based case; then we provide a 3-move anonymous group identification scheme, which is more efficient than that presented in [SCPM, CDS], with the help of this basic scheme; 2) we also extend the original De Santis, Crescenzo and Persiano anonymous group identification scheme to the general case where each user holds public key which is chosen by herself independently. The communication cost for one round execution of the protocolis 2mk, where k is bit length of public key n and m is the number of users in the group.
Chapter PDF
Similar content being viewed by others
References
D. Boneh, and M. Franklin. Anonymous authentication with subset queries. In proceedings of the 6th ACM conference on Computer and Communications Security, pp. 113–119.
N. Braic and B. Pfitzmann. Collision free accumulators and fail-stop signature scheme without trees. Eurocrypt’97, 480–494, 1997.
M. Blum, A. De Santis, S. Micali, and G. Persiano, Non-Interactive Zero Knowledge, SIAM Journal on Computing, vol. 19, n. 6, December 1991, pp. 1084–1118.
R. Cramer, I. Damgaard, B. Schoenmakers: Proofs of PartialKno wledge and Simplified Design of Witness Hiding Protocols, Proceedings of CRYPTO’ 94, Santa Barbara Ca., Springer Verlag LNCS, vol. 839, pp. 174–187.
S. Schechter, T. Parnell, A. Hartemink. Anonymous Authentication of Membership in Dynamic Group. Financial Cryptography’99. Springer-Verlag, 1999, 184–195.
A. De Santis, and G. Di Crescenzo and G. Persiano. Commmunicatione efficient Anonymous Group Identification. With An extended abstract appears in the Proc. of the Fifth ACM Conference on Computer and Communications Security. 1998, page 73–82.
A. De Santis, G. Di Crescenzo, G. Persiano, and M. Yung, On Monotone Formula Closure of SZK, Proceedings of 35th IEEE Symposium on Foundations of Computer Science (FOCS’ 94), Santa Fe, New Mexico, USA, November 20–22, 1994, pp. 454–465.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, C.H., Deng, X., Zhu, H. (2002). Design and Security Analysis of Anonymous Group Identification Protocols. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_13
Download citation
DOI: https://doi.org/10.1007/3-540-45664-3_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43168-8
Online ISBN: 978-3-540-45664-3
eBook Packages: Springer Book Archive