Skip to main content

Group Signatures in Practice

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

Group signature schemes allow a user to sign a message in an anonymous way on behalf of a group. In general, these schemes need the collaboration of a Key Generation Center or a Trusted Third Party, which can disclose the identity of the actual signer if necessary (for example, in order to settle a dispute). This paper presents the results obtained after implementing a group signature scheme using the Integer Factorization Problem and the Subgroup Discrete Logarithm Problem, which has allowed us to check the feasibility of the scheme when using big numbers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chaum, D., van Heyst, E.: Group signatures. Lect. Notes Comput. Sci. 547, 257–265 (1991)

    Google Scholar 

  2. Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. Lect. Notes Comput. Sci. 1296, 410–424 (1997)

    Google Scholar 

  3. Camenisch, J., Michels, M.: Separability and efficiency for generic group signature schemes. Lect. Notes Comput. Sci. 1666, 413–430 (1999)

    Google Scholar 

  4. Bresson, E., Stern, J.: Efficient revocation in group signature. Lect. Notes Comput. Sci. 2001, 190–206 (1992)

    Google Scholar 

  5. Chung, Y.F., Chen, T.L., Chen, T.S., Chen, C.S.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innovative Comput. Inform. Control 8(4), 2713–2727 (2012)

    Google Scholar 

  6. Ogawa, K., Ohtake, G., Fujii, A., Hanaoka, G.: Weakened anonymity of group signature and its application to subscription services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E97-A(6), 1240–1258 (2014)

    Google Scholar 

  7. Emura, K., Miyaji, A., Omote, K.: An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users. J. Appl. Math. 2014, 1–14 (2014)

    Article  Google Scholar 

  8. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Inc, Boca Raton (1996)

    Google Scholar 

  9. Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. Lect. Notes Comput. Sci. 2000, 255–270 (1880)

    Google Scholar 

  10. Ateniese, G., de Medeiros, B.: Efficient group signatures without trapdoors. Lect. Notes Comput. Sci. 2894, 246–268 (2003)

    Google Scholar 

  11. Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. Lect. Notes Comput. Sci. 3329, 89–102 (2004)

    MathSciNet  Google Scholar 

  12. Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptol. 15(2), 75–96 (2002)

    MATH  MathSciNet  Google Scholar 

  13. Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. Lect. Notes Comput. Sci. 3152, 56–72 (2004)

    MathSciNet  Google Scholar 

  14. Boneh, D., Boiyen, X., Shacham, H.: Short group signatures. Lect. Notes Comput. Sci. 3152, 41–55 (2004)

    Google Scholar 

  15. Han, S., Wang, J., Liu, W.: An efficient identity-based group signature scheme over elliptic curves. Lect. Notes Comput. Sci. 3262, 417–429 (2004)

    Google Scholar 

  16. Tan, Z.: An improved identity-based group signature scheme. Lect. Notes Comput. Sci. 3262, 417–429 (2004)

    Google Scholar 

  17. Li, L., De-gong, D., Ying-liang, D.: An improved identity-based group signature scheme. In: International Conference on Information Technology, Computer Engineering and Management Sciences 2011 (ICM 2011). Vol. 2, pp. 269–271 (2011)

    Google Scholar 

  18. Díaz, D.R., Hernández, E.L., Muñoz, M.J.: Two proposals for group signature schemes based on number theory problems. Logic J. IGPL 21(4), 630–647 (2013)

    Google Scholar 

  19. Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P., Chen, L.: Group signatures on mobile devices: practical experiences. Lect. Notes Comput. Sci. 7904, 47–64 (2013)

    Google Scholar 

  20. Spreitzer, R., Schmidt, J.M.: Group-signature schemes on constrained devices: the gap between theory and practice. In: First Workshop on Cryptography and Security in Computing Systems (CS2’14), 31–36 (2014)

    Google Scholar 

  21. Susilo, W.: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theoret. Comput. Sci. 410(8), 736–744 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  22. NIST: Secure Hash Standard. National Institute of Standard and Technology, Federal Information Processing Standard Publication, FIPS, pp. 180–4 (2012)

    Google Scholar 

  23. Oracle Corporation: BigInteger (Java Platform SE 8). http://docs.oracle.com/javase/8/docs/api/java/math/BigInteger.html. (2014)

  24. Oracle Corporation: Random (Java Platform SE 8). http://docs.oracle.com/javase/8/docs/api/java/util/Random.html. (2014)

  25. Knuth, D.E.: The Art of Computer Programming, Vol. 2 (3rd Ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Inc, Boston (1997)

    Google Scholar 

Download references

Acknowledgments

This work has been partially supported under the framework of the international cooperation program managed by National Research Foundation of Korea (NRF-2013K2A1A2053670) and by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Hernández Encinas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Martínez, V.G., Encinas, L.H., Song, SZ. (2015). Group Signatures in Practice. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics