skip to main content
10.1145/2484313.2484382acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

A group signature scheme with unbounded message-dependent opening

Authors Info & Claims
Published:08 May 2013Publication History

ABSTRACT

Group signature with message-dependent opening (GS-MDO) is a kind of group signature in which only the signers who have created group signatures on problematic messages will be identified. In the previous GS-MDO scheme, however, the number of problematic messages is bounded owing to a limitation of the Groth-Sahai proofs. In this paper, we propose the first GS-MDO scheme with the unbounded-MDO functionality in the random oracle model. Our unbounded GS-MDO scheme is based on the short group signature scheme proposed by Boneh, Boyen, and Shacham and the Boneh-Franklin identity-based encryption scheme. To combine these building blocks and to achieve CCA-anonymity, we also construct a special type of multiple encryption. This technique yields an efficient construction compared with the previous bounded GS-MDO scheme: the signature of our scheme contains about 16 group elements (3630 bits), whereas that of the previous scheme has about 450 group elements (75820 bits).

References

  1. M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo. Structure-preserving signatures and commitments to group elements. In T. Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 209--236. Springer, Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Abe, K. Haralambiev, and M. Ohkubo. Signing on elements in bilinear groups for modular protocol design. Cryptology ePrint Archive, Report 2010/133, 2010. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  3. M. Abe, K. Haralambiev, and M. Ohkubo. Group to group commitments do not shrink. In D. Pointcheval and T. Johansson, editors, EUROCRYPT 2012, volume 7237 of LNCS, pages 301--317. Springer, Heidelberg, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 644--644. Springer, Heidelberg, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. In A. Menezes, editor, CT-RSA 2005, volume 3376 of LNCS, pages 136--153. Springer, Heidelberg, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol., 21:149--177, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. Franklin, editor, CRYPTO 2004, volume 3152 of LNCS, pages 227--242. Springer, Heidelberg, 2004.Google ScholarGoogle Scholar
  8. D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. Comput., 32(3):586--615, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, EUROCRYPT '91, volume 547 of LNCS, pages 257--265. Springer, Heidelberg, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Chen, H. W. Lim, S. Ling, H. Wang, and H. Wee. Shorter IBE and signatures via asymmetric pairings. Cryptology ePrint Archive, Report 2012/224, 2012. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  11. R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, CRYPTO 1998, volume 1462 of LNCS, pages 13--25. Springer, Heidelberg, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167--226, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. In N. Smart, editor, EUROCRYPT 2008, volume 4965 of LNCS, pages 415--432. Springer, Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S.-H. Heng and K. Kurosawa. k-resilient identity-based encryption in the standard model. In T. Okamoto, editor, CT-RSA 2004, volume 2964 of LNCS, pages 67--80. Springer, Heidelberg, 2004.Google ScholarGoogle Scholar
  15. Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, T. Matsuda, and K. Omote. Group signatures with message-dependent opening. In Pairing 2012, pages 270--294, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Shacham. A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074, 2007. http://eprint.iacr.org/.Google ScholarGoogle Scholar

Index Terms

  1. A group signature scheme with unbounded message-dependent opening

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
          May 2013
          574 pages
          ISBN:9781450317672
          DOI:10.1145/2484313

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 May 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          ASIA CCS '13 Paper Acceptance Rate35of216submissions,16%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader