Traceable Identity-Based Group Signature
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 193-226

Voir la notice de l'article provenant de la source Numdam

Group signature is a useful cryptographic primitive, which makes every group member sign messages on behalf of a group they belong to. Namely group signature allows that group member anonymously signs any message without revealing his/her specific identity. However, group signature may make the signers abuse their signing rights if there are no measures of keeping them from abusing signing rights in the group signature schemes. So, group manager must be able to trace (or reveal) the identity of the signer by the signature when the result of the signature needs to be arbitrated, and some revoked group members must fully lose their capability of signing a message on behalf of the group they belong to. A practical model meeting the requirement is verifier-local revocation, which supports the revocation of group member. In this model, the verifiers receive the group member revocation messages from the trusted authority when the relevant signatures need to be verified. With the rapid development of identity-based cryptography, several identity-based group signature (IBGS) schemes have been proposed. Compared with group signature based on public key cryptography, IBGS can simplify key management and be used for more applications. Although some identity-based group signature schemes have been proposed, few identity-based group signature schemes are constructed in the standard model and focus on the traceability of signature. In this paper, we present a fully traceable (and verifier-local revocation) identity-based group signature (TIBGS) scheme, which has a security reduction to the computational Diffie–Hellman (CDH) assumption. Also, we give a formal security model for traceable identity-based group signature and prove that the proposed scheme has the properties of traceability and anonymity.

Reçu le :
Accepté le :
DOI : 10.1051/ita/2016021
Classification : 94A60
Keywords: Group signature, identity-based cryptography, traceability, security model

Gu, Ke 1, 2 ; Yang, Lihao 1 ; Wang, Yong 2 ; Wen, Sheng 3

1 School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, P.R. China
2 School of Information Science and Engineering, Central South University, Changsha 410083, P.R. China
3 School of Information Technology, Deakin University, Melbourne, Australia
@article{ITA_2016__50_3_193_0,
     author = {Gu, Ke and Yang, Lihao and Wang, Yong and Wen, Sheng},
     title = {Traceable {Identity-Based} {Group} {Signature}},
     journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications},
     pages = {193--226},
     publisher = {EDP-Sciences},
     volume = {50},
     number = {3},
     year = {2016},
     doi = {10.1051/ita/2016021},
     mrnumber = {3582638},
     zbl = {1371.94640},
     language = {en},
     url = {http://geodesic.mathdoc.fr/articles/10.1051/ita/2016021/}
}
TY  - JOUR
AU  - Gu, Ke
AU  - Yang, Lihao
AU  - Wang, Yong
AU  - Wen, Sheng
TI  - Traceable Identity-Based Group Signature
JO  - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
PY  - 2016
SP  - 193
EP  - 226
VL  - 50
IS  - 3
PB  - EDP-Sciences
UR  - http://geodesic.mathdoc.fr/articles/10.1051/ita/2016021/
DO  - 10.1051/ita/2016021
LA  - en
ID  - ITA_2016__50_3_193_0
ER  - 
%0 Journal Article
%A Gu, Ke
%A Yang, Lihao
%A Wang, Yong
%A Wen, Sheng
%T Traceable Identity-Based Group Signature
%J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
%D 2016
%P 193-226
%V 50
%N 3
%I EDP-Sciences
%U http://geodesic.mathdoc.fr/articles/10.1051/ita/2016021/
%R 10.1051/ita/2016021
%G en
%F ITA_2016__50_3_193_0
Gu, Ke; Yang, Lihao; Wang, Yong; Wen, Sheng. Traceable Identity-Based Group Signature. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 193-226. doi: 10.1051/ita/2016021

Cité par Sources :