Abstract
Group signature schemes allow a user to sign a message in an anonymous way on behalf of a group. In general, these schemes need the collaboration of a Key Generation Center or a Trusted Third Party, which can disclose the identity of the actual signer if necessary (for example, in order to settle a dispute). This paper presents the results obtained after implementing a group signature scheme using the Integer Factorization Problem and the Subgroup Discrete Logarithm Problem, which has allowed us to check the feasibility of the scheme when using big numbers.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chaum, D., van Heyst, E.: Group signatures. Lect. Notes Comput. Sci. 547, 257–265 (1991)
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. Lect. Notes Comput. Sci. 1296, 410–424 (1997)
Camenisch, J., Michels, M.: Separability and efficiency for generic group signature schemes. Lect. Notes Comput. Sci. 1666, 413–430 (1999)
Bresson, E., Stern, J.: Efficient revocation in group signature. Lect. Notes Comput. Sci. 2001, 190–206 (1992)
Chung, Y.F., Chen, T.L., Chen, T.S., Chen, C.S.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innovative Comput. Inform. Control 8(4), 2713–2727 (2012)
Ogawa, K., Ohtake, G., Fujii, A., Hanaoka, G.: Weakened anonymity of group signature and its application to subscription services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E97-A(6), 1240–1258 (2014)
Emura, K., Miyaji, A., Omote, K.: An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users. J. Appl. Math. 2014, 1–14 (2014)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Inc, Boca Raton (1996)
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. Lect. Notes Comput. Sci. 2000, 255–270 (1880)
Ateniese, G., de Medeiros, B.: Efficient group signatures without trapdoors. Lect. Notes Comput. Sci. 2894, 246–268 (2003)
Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. Lect. Notes Comput. Sci. 3329, 89–102 (2004)
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptol. 15(2), 75–96 (2002)
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. Lect. Notes Comput. Sci. 3152, 56–72 (2004)
Boneh, D., Boiyen, X., Shacham, H.: Short group signatures. Lect. Notes Comput. Sci. 3152, 41–55 (2004)
Han, S., Wang, J., Liu, W.: An efficient identity-based group signature scheme over elliptic curves. Lect. Notes Comput. Sci. 3262, 417–429 (2004)
Tan, Z.: An improved identity-based group signature scheme. Lect. Notes Comput. Sci. 3262, 417–429 (2004)
Li, L., De-gong, D., Ying-liang, D.: An improved identity-based group signature scheme. In: International Conference on Information Technology, Computer Engineering and Management Sciences 2011 (ICM 2011). Vol. 2, pp. 269–271 (2011)
Díaz, D.R., Hernández, E.L., Muñoz, M.J.: Two proposals for group signature schemes based on number theory problems. Logic J. IGPL 21(4), 630–647 (2013)
Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P., Chen, L.: Group signatures on mobile devices: practical experiences. Lect. Notes Comput. Sci. 7904, 47–64 (2013)
Spreitzer, R., Schmidt, J.M.: Group-signature schemes on constrained devices: the gap between theory and practice. In: First Workshop on Cryptography and Security in Computing Systems (CS2’14), 31–36 (2014)
Susilo, W.: Short fail-stop signature scheme based on factorization and discrete logarithm assumptions. Theoret. Comput. Sci. 410(8), 736–744 (2009)
NIST: Secure Hash Standard. National Institute of Standard and Technology, Federal Information Processing Standard Publication, FIPS, pp. 180–4 (2012)
Oracle Corporation: BigInteger (Java Platform SE 8). http://docs.oracle.com/javase/8/docs/api/java/math/BigInteger.html. (2014)
Oracle Corporation: Random (Java Platform SE 8). http://docs.oracle.com/javase/8/docs/api/java/util/Random.html. (2014)
Knuth, D.E.: The Art of Computer Programming, Vol. 2 (3rd Ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Inc, Boston (1997)
Acknowledgments
This work has been partially supported under the framework of the international cooperation program managed by National Research Foundation of Korea (NRF-2013K2A1A2053670) and by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Martínez, V.G., Encinas, L.H., Song, SZ. (2015). Group Signatures in Practice. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)