Skip to main content

Group signatures for hierarchical multigroups

  • Signature/Authentication
  • Conference paper
  • First Online:
Information Security (ISW 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1396))

Included in the following conference series:

Abstract

At Eurocrypt'91, D. Chaum and E. Heyst introduced the notion of group signatures, which allow members of a group to make signatures on behalf of the group while remaining anonymous. This paper first presents a new type of group signatures for hierarchical multigroups. In group signatures for hierarchical multigroups, a user who is a member of a higher group is not only able to make a group signature of his higher group, but also able to make a group signature of lower affiliated group without disclosing his higher membership, while the size of the secret data is independent of the number of the groups in which the user participates. Furthermore, if necessary, the group authority identifies a signer from the given group signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Chaum and E. van Heyst, “Group signatures,” Advances in Cryptology — Eu-rocrypt'91, Springer-Verlag, Lecture Notes in Computer Science Vol. 547, 1992, pp.257–265.

    Google Scholar 

  2. L. Chen and T.P. Pedersen, “New group signature schemes,” Advances in Cryptol-ogy — Eurocrypt'94, Springer-Verlag, Lecture Notes in Computer Science Vol. 950, 1995, pp.163–173.

    Google Scholar 

  3. H. Petersen, “How to convert any digital signature scheme into a group signature scheme,” The Proceedings of Security Protocols Workshop'97, 1997.

    Google Scholar 

  4. M. Stadler, “Publicly verifiable secret sharing,” Advances in Cryptology — Eurocrypt'96, Springer-Verlag, Lecture Notes in Computer Science Vol. 1070, 1996, pp.190–199.

    Google Scholar 

  5. S.J. Park, S.J. Kim and D.H. Won, “ID-based group signature,” Electronics Letters, 1997, pp.1616–1617.

    Google Scholar 

  6. S.J. Kim, S.J. Park and D.H. Won, “Equivocally verifiable encryption and its applications,” manuscript, 1997.

    Google Scholar 

  7. J. Camenisch, “Efficient and generalized group signatures,” Advances in Cryptology — Eurocrypt'97, Springer-Verlag, Lecture Notes in Computer Science Vol. 1233, 1997, pp.465–479.

    Google Scholar 

  8. J. Camenisch and M. Stadler, “Efficient group signature schemes for large groups,” Advances in Cryptology — Crypto'97, Springer-Verlag, Lecture Notes in Computer Science Vol. 1294, 1997, pp.410–424.

    Google Scholar 

  9. S.J. Park, I.S. Lee and D.H. Won, “A practical group signature,” Proceedings of the 1995 Japan-Korea Joint Workshop on Information Security and Cryptography, 1995, pp.127–133.

    Google Scholar 

  10. S.J. Park and D.H. Won, “Remarks on practical group signature,” manuscript, 1996.

    Google Scholar 

  11. K. Ohta, T. Okamoto, and K. Koyama, “Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme,” Advances in Cryptology — Eurocrypt'90, Springer-Verlag, Lecture Notes in Computer Science Vol. 473, 1991, pp.446–458.

    Google Scholar 

  12. C. Shu, T. Matsumoto, and H. Imai, “A multi-purpose proof system,” IEICE Trans. Fundamentals, Vol.E75-A, No.6, 1992, pp.735–743.

    Google Scholar 

  13. R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, 21(2):120–126, Feb, 1978.

    Google Scholar 

  14. S. Kim and B.S. Um, “A multipurpose membership proof system based on discrete logarithms,” The Proceedings of Korea-Japan Joint Workshop on Information Security and Cryptology'93, 1993, pp.177–183.

    Google Scholar 

  15. L.C. Guillou and J.J. Quisquater, “A paradoxical identity-based signature scheme resulting from zero-knowledge,” Advances in Cryptology — Crypto'88, Springer-Verlag, Lecture Notes in Computer Science Vol. 403, 1990, pp.216–231.

    Google Scholar 

  16. K. Ohta and T. Okamoto, “Practical extension on Fiat-Shamir scheme,” Electron. Lett., 1988, 24, (15), pp.955–956.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Eiji Okamoto George Davida Masahiro Mambo

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, S., Park, S., Won, D. (1998). Group signatures for hierarchical multigroups. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030428

Download citation

  • DOI: https://doi.org/10.1007/BFb0030428

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64382-1

  • Online ISBN: 978-3-540-69767-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics