TY - GEN
T1 - Efficient and secure member deletion in group signature schemes
AU - Kim, Hyun Jeong
AU - Lim, Jong In
AU - Lee, Dong Hoon
PY - 2001
Y1 - 2001
N2 - Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in [2], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper, we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures are independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.
AB - Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in [2], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper, we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures are independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.
UR - http://www.scopus.com/inward/record.url?scp=84959043878&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959043878&partnerID=8YFLogxK
U2 - 10.1007/3-540-45247-8_12
DO - 10.1007/3-540-45247-8_12
M3 - Conference contribution
AN - SCOPUS:84959043878
SN - 3540417826
SN - 9783540452478
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 150
EP - 161
BT - Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings
A2 - Won, Dongho
PB - Springer Verlag
T2 - 3rd International Conference on Information Security and Cryptology, ICISC 2000
Y2 - 8 December 2000 through 9 December 2000
ER -