Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 983040, 14 pages
http://dx.doi.org/10.1155/2014/983040
Research Article

An -Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

1National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795, Japan
2Japan Advanced Institute of Science and Technology (JAIST), 1-1 Asahidai, Nomi, Ishikawa 923-1292, Japan

Received 11 November 2013; Accepted 14 April 2014; Published 2 June 2014

Academic Editor: Baolin Wang

Copyright © 2014 Keita Emura et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Chaum and E. van Heyst, “Group signatures,” in Advances in Cryptology: EUROCRYPT 1991, pp. 257–265, Springer, Berlin, Germany, 1991. View at Google Scholar
  2. D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology: CRYPTO 2004, vol. 3152, pp. 41–55, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  3. D. Boneh and H. Shacham, “Group signatures with verifier-local revocation,” in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), pp. 168–177, Springer, New York, NY, USA, October 2004. View at Scopus
  4. C. Delerablée and D. Pointcheval, “Dynamic fully anonymous short group signatures,” in Progress in Cryptology: VIETCRYPT 2006, pp. 193–210, Springer, Berlin, Germany, 2006. View at Google Scholar
  5. B. Libert and D. Vergnaud, “Group signatures with verifier-local revocation and backward unlinkability in the standard model,” in Proceedings of the 8th International Conference on Cryptology and Network Security (CANS '09), pp. 498–517, Springer, Kanazawa, Japan, December 2009.
  6. T. Nakanishi, H. Fujii, Y. Hira, and N. Funabiki, “Revocable group signature schemes with constant costs for signing and verifying,” in Public Key Cryptography: PKC 2009, vol. 5443, pp. 463–480, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. B. Libert, T. Peters, and M. Yung, “Group signatures with almost-for-free revocation,” in Advances in Cryptology: CRYPTO 2012, pp. 571–589, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. B. Libert, T. Peters, and M. Yung, “Scalable group signatures with revocation,” in Advances in Cryptology: EUROCRYPT 2012, vol. 7237, pp. 609–627, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  9. T. Nakanishi and N. Funabiki, “Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps,” in Advances in Cryptology: ASIACRYPT 2005, vol. 3788, pp. 533–548, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  10. T. Nakanishi and N. Funabiki, “A short verifier-local revocation group signature scheme with backward unlinkability,” in Advances in Information and Computer Security, vol. 4266, pp. 17–32, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  11. L. Nguyen, “Accumulators from bilinear pairings and applications,” in Topics in Cryptology: CT-RSA 2005, vol. 3376, pp. 275–292, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. T. Nakanishi and N. Funabiki, “Efficient revocable group signature schemes using primes,” Journal of Information Processing, vol. 16, pp. 110–121, 2008. View at Google Scholar
  13. T. Nakanishi, F. Kubooka, N. Hamada, and N. Funabiki, “Group signature schemes with membership revocation for large groups,” in Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05), pp. 443–454, Brisbane, Australia, July 2005. View at Scopus
  14. T. Isshiki, K. Mori, K. Sako, I. Teranishi, and S. Yonezawa, “Using group signatures for identity management and its implementation,” in Proceedings of the second ACM Workshop on Digital Identity Management, pp. 73–78, ACM, Alexandria, VA, USA, November 2006.
  15. J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer, “An application of the Boneh and Shacham group signature scheme to biometric authentication,” in Advances in Information and Computer Security, pp. 219–230, Springer, Berlin, Germany, 2008. View at Google Scholar
  16. D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Advances in Cryptology: CRYPTO 2001, vol. 2139, pp. 41–62, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  17. L. Chen and J. Li, “VLR group signatures with indisputable exculpability and efficient revocation,” in Proceedings of the 2nd IEEE International Conference on Social Computing (SocialCom '10), and the 2nd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT '10), pp. 727–734, IEEE Computer Society, Minneapolis, Minn, USA, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Bringer and A. Patey, “VLR group signatures: how to achieve both backward unlinkability and efficient revocation checks,” in Proceedings of the International Conference on Security and Cryptography, pp. 215–220, SciTePress, Rome, Italy, July 2012.
  19. K. Emura, A. Miyaji, and K. Omote, “An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation,” in Provable Security, vol. 6402, pp. 184–198, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  20. G. Ateniese and G. Tsudik, “Some open issues and new directions in group signatures,” in Financial Cryptography, pp. 196–211, Springer, Berlin, Germany, 1999. View at Google Scholar
  21. V. Benjumea, S. G. Choi, J. Lopez, and M. Yung, “Fair traceable multi-group signatures,” in Financial Cryptography, pp. 231–246, Springer, Berlin, Germany, 2008. View at Google Scholar
  22. K. Emura, A. Miyaji, and K. Omote, “A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics,” Journal of Information Processing, vol. 17, pp. 216–231, 2009. View at Google Scholar
  23. H. Fujii, T. Nakanishi, and N. Funabiki, “A proposal of efficient attribute-based group signature schemes using pairings,” IEICE Technical Report, vol. 109, no. 272, pp. 15–22, 2009 (Japanese). View at Google Scholar
  24. D. Khader, “Attribute based group signature with revocation,” Cryptology ePrint Archive, Report 2007/241, 2007. View at Google Scholar
  25. D. Khader, “Attribute based group signatures,” Cryptology ePrint Archive, Report 2007/159, 2007. View at Google Scholar
  26. A. Boldyreva, “Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme,” in Public Key Cryptography: PKC 2003, vol. 2567, pp. 31–46, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  27. M. Bellare, D. Micciancio, and B. Warinschi, “Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions,” in Advances in Cryptology: EUROCRYPT 2003, vol. 2656, pp. 614–629, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  28. M. Bellare, H. Shi, and C. Zhang, “Foundations of group signatures: the case of dynamic groups,” in Topics in Cryptology: CT-RSA 2005, vol. 3376, pp. 136–153, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  29. Y. Sakai, J. C. N. Schuldt, K. Emura, G. Hanaoka, and K. Ohta, “On the security of dynamic group signatures: preventing signature hijacking,” in Public Key Cryptography, pp. 715–732, Springer, Berlin, Germany, 2012. View at Google Scholar
  30. A. Kiayias and M. Yung, “Group signatures with efficient concurrent join,” in Advances in Cryptology: EUROCRYPT 2005, vol. 3494, pp. 198–214, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  31. A. Kiayias and M. Yung, “Secure scalable group signature with dynamic joins and separable authorities,” International Journal of Security and Networks, vol. 1, no. 1-2, pp. 24–45, 2006. View at Google Scholar
  32. J. Furukawa and H. Imai, “An efficient group signature scheme from bilinear maps,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E89-A, no. 5, pp. 1328–1337, 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Groth, “Fully anonymous group signatures without random oracles,” in Advances in Cryptology: ASIACRYPT 2007, vol. 4833, pp. 164–180, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  34. X. Boyen and B. Waters, “Full-domain subgroup hiding and constant-size group signatures,” in Public Key Cryptography: PKC 2007, vol. 4450, pp. 1–15, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  35. A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in Advances in cryptology: CRYPTO 1987, vol. 263, pp. 186–194, Springer, Berlin, Germany, 1987. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  36. J. Groth and A. Sahai, “Efficient non-interactive proof systems for bilinear groups,” in Advances in Cryptology: EUROCRYPT 2008, vol. 4965, pp. 415–432, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  37. M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, “Structure-preserving signatures and commitments to group elements,” in Advances in Cryptology: CRYPTO 2010, vol. 6223, pp. 209–236, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  38. S. D. Gordon, J. Katz, and V. Vaikuntanathan, “A group signature scheme from lattice assumptions,” in Advances in Cryptology: ASIACRYPT 2010, vol. 6477, pp. 395–412, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  39. F. Laguillaumie, A. Langlois, B. Libert, and D. Stehlé, “Lattice-based group signatures with logarithmic signature size,” in Advances in Cryptology: ASIACRYPT 2013, pp. 41–61, 2013. View at Google Scholar
  40. A. Langlois, S. Ling, K. Nguyen, and H. Wang, “Lattice-based group signature scheme with verifier-local revocation,” in Public Key Cryptography: PKC 2014, pp. 345–361, Springer, Berlin, Germany, 2014. View at Google Scholar
  41. P. Bichsel, J. Camenisch, G. Neven, N. P. Smart, and B. Warinschi, “Get shorty via group signatures without encryption,” in Security and Cryptography for Networks, pp. 381–398, Springer, Berlin, Germany, 2010. View at Google Scholar
  42. L. El Aimani and O. Sanders, “Efficient group signatures in the standard model,” in Information Security and Cryptology: ICISC 2012, pp. 410–424, Springer, Berlin, Germany, 2012. View at Google Scholar
  43. K. Ohara, Y. Sakai, K. Emura, and G. Hanaoka, “A group signature scheme with unbounded message-dependent opening,” in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS '13), pp. 517–522, ACM, Hangzhou, China, May 2013.
  44. Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, T. Matsuda, and K. Omote, “Group signatures with message-dependent opening,” in Pairing-Based Cryptography: Pairing 2012, pp. 270–294, Springer, Berlin, Germany, 2012. View at Google Scholar
  45. B. Libert and M. Joye, “Group signatures with message-dependent opening in the standard model,” in Topics in Cryptology: CT-RSA 2014, pp. 286–306, Springer, Berlin, Germany, 2014. View at Google Scholar
  46. D. X. Song, “Practical forward secure group signature schemes,” in Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), pp. 225–234, Philadelphia, Pa, USA, November 2001. View at Scopus
  47. T. Nakanishi, Y. Hira, and N. Funabiki, “Forward-secure group signatures from pairings,” in Pairing-Based Cryptography: Pairing 2009, vol. 5671, pp. 171–186, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  48. B. Libert and M. Yung, “Dynamic fully forward-secure group signatures,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10), pp. 70–81, ACM, Beijing, China, April 2010.
  49. B. Libert and M. Yung, “Fully forward-secure group signatures,” in Cryptography and Security, pp. 156–184, Springer, Berlin, Germany, 2012. View at Google Scholar
  50. N. P. Smart and B. Warinschi, “Identity based group signatures from hierarchical identity-based encryption,” in Pairing-Based Cryptography: Pairing 2009, vol. 5671, pp. 150–170, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  51. V. K. Wei, T. H. Yuen, and F. Zhang, “Group signature where group manager, members and open authority are identity-based,” in Information Security and Privacy, pp. 468–480, Springer, Berlin, Germany, 2005. View at Google Scholar
  52. G. Ohtake, A. Fujii, G. Hanaoka, and K. Ogawa, “On the theoretical gap between group signatures with and without unlinkability,” in Progress in Cryptology: AFRICACRYPT 2009, pp. 149–166, Springer, Berlin, Germany, 2009. View at Google Scholar
  53. M. Abdalla and B. Warinschi, “On the minimal assumptions of group signature schemes,” in Proceedings of the International Conference on Information and Communications Security (ICICS '04), pp. 1–13, Springer, Malaga, Spain, October 2004.
  54. K. Emura, G. Hanaoka, Y. Sakai, and J. C. N. Schuldt, “Group signature implies public-key encryption with non-interactive opening,” International Journal of Information Security, vol. 13, no. 1, pp. 51–62, 2014. View at Google Scholar
  55. I. Damgård, D. Hofheinz, E. Kiltz, and R. Thorbek, “Public-key encryption with non-interactive opening,” in Topics in Cryptology: CT-RSA 2008, vol. 4964, pp. 239–255, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  56. D. Boneh and X. Boyen, “Short signatures without random oracles and the SDH assumption in bilinear groups,” Journal of Cryptology, vol. 21, no. 2, pp. 149–177, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  57. M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-TAA,” in Security and Cryptography for Networks, pp. 111–125, Springer, Berlin, Germany, 2006. View at Google Scholar
  58. S. Taqi Ali and B. B. Amberker, “Dynamic attribute based group signature with attribute anonymity and tracing in the standard model,” in Security, Privacy, and Applied Cryptography Engineering, pp. 147–171, Springer, Berlin, Germany, 2013. View at Google Scholar
  59. M. Gagné, S. Narayan, and R. Safavi-Naini, “Short pairing-efficient threshold-attribute-based signature,” in Pairing-Based Cryptography: Pairing 2012, pp. 295–313, Springer, Berlin, Germany, 2012. View at Google Scholar
  60. T. Okamoto and K. Takashima, “Efficient attribute-based signatures for non-monotone predicates in the standard model,” in Public Key Cryptography: PKC 2011, vol. 6571, pp. 35–52, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  61. T. Okamoto and K. Takashima, “Decentralized attribute-based signatures,” in Public Key Cryptography: PKC 2013, pp. 125–142, Springer, Berlin, Germany, 2013. View at Google Scholar
  62. J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute-based signature and its applications,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS '10), pp. 60–69, ACM, Beijing, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  63. J. Li and K. Kim, “Hidden attribute-based signatures without anonymity revocation,” Information Sciences, vol. 180, no. 9, pp. 1681–1689, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  64. H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures,” in Topics in Cryptology: CT-RSA 2011, vol. 6558, pp. 376–392, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  65. S. F. Shahandashti and R. Safavi-Naini, “Threshold attribute-based signatures and their application to anonymous credential systems,” in Progress in Cryptology: AFRICACRYPT 2009, pp. 198–216, Berlin, Germany, 2009. View at Google Scholar
  66. J. Herranz, F. Laguillaumie, B. Libert, and C. Ràfols, “Short attribute-based signatures for threshold predicates,” in Topics in Cryptology: CT-RSA 2012, vol. 7178, pp. 51–67, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  67. C. Chen, J. Chen, H. W. Lim et al., “Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures,” in Topics in Cryptology: CT-RSA 2013, pp. 50–67, Springer, Berlin, Germany, 2013. View at Google Scholar
  68. S. Kumar, S. Agrawal, S. Balaraman, and C. P. Rangan, “Attribute based signatures for bounded multi-level threshold circuits,” in Public Key Infrastructures, Services and Applications, pp. 141–154, Springer, Berlin, Germany, 2010. View at Google Scholar
  69. A. Sudarsono, T. Nakanishi, and N. Funabiki, “Efficient proofs of attributes in pairingbased anonymous credential system,” in Privacy Enhancing Technologies, pp. 246–263, Springer, Berlin, Germany, 2011. View at Google Scholar
  70. J. Camenisch, M. Kohlweiss, and C. Soriente, “An accumulator based on bilinear maps and efficient revocation for anonymous credentials,” in Public Key Cryptography: PKC 2009, vol. 5443, pp. 481–500, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  71. N. Begum, T. Nakanishi, and N. Funabiki, “Efficient proofs for CNF formulas on attributes in pairing-based anonymous credential system,” in Information Security and Cryptology: ICISC 2012, pp. 495–509, Springer, Berlin, Germany, 2012. View at Google Scholar
  72. B. Libert, K. G. Paterson, and E. A. Quaglia, “Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model,” in Public Key Cryptography: PKC 2012, pp. 206–224, Springer, Berlin, Germany, 2012. View at Google Scholar
  73. K. G. Paterson and S. Srinivasan, “Building key-private public-key encryption schemes,” in Information Security and Privacy, pp. 276–292, Springer, Berlin, Germany, 2009. View at Google Scholar
  74. M. Abdalla, M. Bellare, and G. Neven, “Robust encryption,” in Proceedings of the 7th International Conference on Theory of Cryptography (TCC '10), pp. 480–497, Springer, Zurich, Switzerland, February 2010.
  75. N. Fazio and I. M. Perera, “Outsider-anonymous broadcast encryption with sublinear ciphertexts,” in Public Key Cryptography: PKC 2012, pp. 225–242, Springer, Berlin, Germany, 2012. View at Google Scholar
  76. K. Emura, A. Miyaji, and K. Omote, “A revocable group signature scheme with the property of hiding the number of revoked users,” in Information Security and Cryptology: ICISC 2011, pp. 186–203, Springer, Berlin, Germany, 2011. View at Google Scholar