Some Open Issues and New Directions in Group Signatures

  • Giuseppe Ateniese
  • Gene Tsudik
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1648)


Group signatures allow any member of a potentially large group to sign on behalf of the group. Group signatures are anonymous and unlinkable for everyone with the exception of a designated group manager who can co-relate signatures and reveal the identity of the acp- tual signer. At the same time, no one (including a group manager) can misattribute a valid group signature. Group signatures are claimed to have many practical applications in e-commerce as well as in military and legal fields.

Despite some interesting and eclectic results, group signatures remain confined to academic literature. The focus of this paper is two-fold. First, it discusses certain issues that stand in the way of practical applications of group signatures and uses the example of on recent group signature scheme to illustrate certain problems. Second, this paper (informally) introduces some practical security services that can be constructed us- ing any group signature scheme. Sample realizations of these services are provided.


Public-key Cryptography Digital Signatures Group Signatures Multi-Group Signatures Sub-Group Signatures Coalition Attacks Revocation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    C. Boyd Digital Multi-signatures. Cryptography and Coding (H.J. Beker and F.C. Piper Eds.), Oxford University Press, 1989, pp 241–246.Google Scholar
  2. 2.
    M. Burmester and Y. Desmedt A secure and e_cient conference key distribution system. In Advances in Cryptology-EUROCRYPT, 1994.Google Scholar
  3. 3.
    J. Camenisch Efficient and generalized group signatures. In Advances in Cryptology-EUROCRYPT, 1997.Google Scholar
  4. 4.
    J. Camenisch and M. Stadler Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO, 1997.Google Scholar
  5. 5.
    D. Chaum and T. Pedersen Wallet databases with observers. In Advances in Cryptology-CRYPTO, 1992.Google Scholar
  6. 6.
    D. Chaum and E. van Heyst Group signatures. In Advances in Cryptology-EUROCRYPT, 1991.Google Scholar
  7. 7.
    L. Chen and T. Pedersen On the efficiency of group signatures providing information-theoretic anonymity. In Advances in Cryptology-EUROCRYPT, 1995.Google Scholar
  8. 8.
    A. Lysyanskaya and Z. Ramzan Group blind digital signatures. In Financial Cryptography Conference, 1998.Google Scholar
  9. 9.
    H. Petersen How to convert any digital signature scheme into a group signature scheme. In Security Protocols Workshop, 1997.Google Scholar
  10. 10.
    M. Steiner, G. Tsudik, and M. Waidner Diffie-hellman key distribution extended to groups. In ACM Conference on Computer and Communication Security, pages 31–37, March 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Giuseppe Ateniese
    • 1
  • Gene Tsudik
    • 1
  1. 1.USC Information Sciences InstituteMarina Del ReyUSA

Personalised recommendations