Group signature is a useful cryptographic primitive, which makes every group member sign messages on behalf of a group they belong to. Namely group signature allows that group member anonymously signs any message without revealing his/her specific identity. However, group signature may make the signers abuse their signing rights if there are no measures of keeping them from abusing signing rights in the group signature schemes. So, group manager must be able to trace (or reveal) the identity of the signer by the signature when the result of the signature needs to be arbitrated, and some revoked group members must fully lose their capability of signing a message on behalf of the group they belong to. A practical model meeting the requirement is verifier-local revocation, which supports the revocation of group member. In this model, the verifiers receive the group member revocation messages from the trusted authority when the relevant signatures need to be verified. With the rapid development of identity-based cryptography, several identity-based group signature (IBGS) schemes have been proposed. Compared with group signature based on public key cryptography, IBGS can simplify key management and be used for more applications. Although some identity-based group signature schemes have been proposed, few identity-based group signature schemes are constructed in the standard model and focus on the traceability of signature. In this paper, we present a fully traceable (and verifier-local revocation) identity-based group signature (TIBGS) scheme, which has a security reduction to the computational Diffie–Hellman (CDH) assumption. Also, we give a formal security model for traceable identity-based group signature and prove that the proposed scheme has the properties of traceability and anonymity.
Accepté le :
DOI : 10.1051/ita/2016021
Mots clés : Group signature, identity-based cryptography, traceability, security model
@article{ITA_2016__50_3_193_0, author = {Gu, Ke and Yang, Lihao and Wang, Yong and Wen, Sheng}, title = {Traceable {Identity-Based} {Group} {Signature}}, journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications}, pages = {193--226}, publisher = {EDP-Sciences}, volume = {50}, number = {3}, year = {2016}, doi = {10.1051/ita/2016021}, mrnumber = {3582638}, zbl = {1371.94640}, language = {en}, url = {http://archive.numdam.org/articles/10.1051/ita/2016021/} }
TY - JOUR AU - Gu, Ke AU - Yang, Lihao AU - Wang, Yong AU - Wen, Sheng TI - Traceable Identity-Based Group Signature JO - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications PY - 2016 SP - 193 EP - 226 VL - 50 IS - 3 PB - EDP-Sciences UR - http://archive.numdam.org/articles/10.1051/ita/2016021/ DO - 10.1051/ita/2016021 LA - en ID - ITA_2016__50_3_193_0 ER -
%0 Journal Article %A Gu, Ke %A Yang, Lihao %A Wang, Yong %A Wen, Sheng %T Traceable Identity-Based Group Signature %J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications %D 2016 %P 193-226 %V 50 %N 3 %I EDP-Sciences %U http://archive.numdam.org/articles/10.1051/ita/2016021/ %R 10.1051/ita/2016021 %G en %F ITA_2016__50_3_193_0
Gu, Ke; Yang, Lihao; Wang, Yong; Wen, Sheng. Traceable Identity-Based Group Signature. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 193-226. doi : 10.1051/ita/2016021. http://archive.numdam.org/articles/10.1051/ita/2016021/
M.H. Au, J.K. Liu, T.H. Yuen and D.S. Wong, ID-based ring signature scheme secure in the standard mode, In Proc. of IWSEC (2006) 1–16. | MR
Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction. Theoret. Comput. Sci. 469 (2013) 1–14. | DOI | MR | Zbl
, , and ,G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A practical and provably secure coalition-resistant group signature scheme. In Vol. 1880 of Lect. Notes Comput. Sci. Springer (2000) 255–270. | MR | Zbl
G. Ateniese, D. Song and G. Tsudik, Quasi-Efficient Revocation in Group Signatures. In Financial Cryptography’02. Vol. 2357 of Lect. Notes Comput. Sci. Springer (2002) 183–197. | Zbl
P.S.L.M. Barreto, B. Libert, N. McCullagh and J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In Asiacrypt 2005, edited by B. Roy. Vol. 3788 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2005) 515–532. | MR | Zbl
M. Bellare, D. Micciancio and B. Warinschi, Foundations of group signatures: Formal definitions, simplified require-ments, and a construction based on general assumptions. In Eurocrypt’03. Vol. 2656 of Lect. Notes Comput. Sci. Springer (2003) 614–629. | MR | Zbl
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, edited by J. Kilian. Vol. 2139 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2001) 213–229. | MR | Zbl
D. Boneh and M. Hanburg, Generalized identity based and broadcast encryption schemes. In Advances in Cryptology-ASIACRYPT 2008, edited by J. Pieprzyk. Vol. 5350 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2008) 455–470. | MR | Zbl
D. Boneh and H. Shacham, Group signatures with verifier-local revocation. In ACM-CCS’04 (2004) 168–177.
D. Boneh, X. Boyen and H. Shacham, Short Group Signatures. In Crypto’04. Vol. 3152 of Lect. Notes Comput. Sci. Springer (2004) 41–55. | MR | Zbl
E. Bresson and J. Stern, Efficient Revocation in Group Signatures. In PKC’01. Vol. 1992 of Lect. Notes Comput. Sci. Springer (2001) 190–206. | MR | Zbl
E. Brickell, An efficient protocol for anonymously providing assurance of the container of the private key. Sub-mission to the Trusted Computing Group (2003).
E. Brickell, J. Camenisch and L. Chen, Direct Anonymous Attestation. In ACM-CCS’04 (2004) 132–145.
J. Camenisch and A. Lysyanskaya, Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Crypto’02. Vol. 2442 of Lect. Notes Comput. Sci. Springer (2002) 61–76. | MR | Zbl
J. Camenisch, M. Kohlweiss and C. Soriente, An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In PKC’09. Vol. 5443 of Lect. Notes Comput. Sci. Springer (2009) 481–500. | MR | Zbl
J.C. Cha and J.H. Cheon, An identity-based signature from gap Diffie–Hellman groups. In Public Key Cryptography – PKC 2003, edited by Y. Desmedt. Vol. 2567 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2002) 18–30. | MR | Zbl
D. Chaum and E. van Heyst, Group Signatures. In Eurocrypt’91. Vol. 547 of Lect. Notes Comput. Sci. Springer (1991) 257–265. | Zbl
An -Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users. J. Appl. Math. 2014 (2014) 14. | DOI | Zbl
, and ,F. Hess, Efficient identity based signature schemes based on pairings. In Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, edited by K. Nyberg, H. Heys. Vol. 2595 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2003) 310–324. | MR | Zbl
L. Ibraimi, S. Nikova, P. Hartel and W. Jonker, An Identity-Based Group Signature with Membership Revocation in the Standard Model, available at: http:/doc.utwente.nl/72270/1/Paper.pdf.
B. Libert and D. Vergnaud, Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. In CANS’09. Vol. 5888 of Lect. Notes Comput. Sci. Springer (2009) 498–517. | Zbl
B. Libert, T. Peters and M. Yung, Scalable Group Signatures with Revocation. Advances in Cryptology-EUROCRYPT 2012. Vol. 7323 of Lect. Notes Comput. Sci. Springer-Verlag (2012) 609-627. | MR | Zbl
B. Libert, T. Peters and M. Yung, Scalable Group Signatures with Almost-for-Free Revocation. Advances in Cryptology-CRYPTO 2012. Vol. 7417 of Lect. Notes Comput. Sci. Springer-Verlag (2012) 571–589. | MR | Zbl
T. Nakanishi and N. Funabiki, Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. In Asiacrypt’05. Vol. 5443 of Lect. Notes Comput. Sci. Springer (2009) 533-548. | MR | Zbl
T. Nakanishi, H. Fujii, Y. Hira and N. Funabiki, Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. In PKC’09. Vol. 5443 of Lect. Notes Comput. Sci. Springer (2009) 463–480. | MR | Zbl
L. Nguyen, Accumulators from Bilinear Pairings and Applications. In CT-RSA’05. Vol. 3376 of Lect. Notes Comput. Sci. Springer (2005) 275–292. | MR | Zbl
K.G. Paterson and J.C.N. Schuldt, Efficient identity-based signatures secure in the standard model. In ACISP 2006. Vol. 4058 of Lect. Notes Comput. Sci. Springer-Verlag (2006) 207–222. | Zbl
ID-based proxy signature scheme with message recovery. J. Systems Software 85 (2012) 209–214. | DOI
and ,B. Waters, Efficient identity-based encryption without random oracles, Advances in Cryptology-EUROCRYPT 2005. Vol. 3494 of Lect. Notes Comput. Sci. Springer-Verlag (2005) 114–127. | MR | Zbl
An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure. Int. J. Adv. Comput. Technol. 3 (2011) 108–116.
, and ,W. Wu, Y. Mu, W. Susilo, J. Seberry and X.Y. Huang, Identity-Based Proxy Signature from Pairings, In ATC 2007, edited by B. Xiao et al. Vol. 4610 of Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2007) 22–31.
F. Zhang and K. Kim, ID-based blind signature and ring signature from pairings. in Asiacrypt 2002. Vol. 2501 Lect. Notes Comput. Sci. Springer-Verlag, Berlin (2002) 533–547. | MR | Zbl
S. Zhou, D. Lin, Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. In CANS’06. Vol. 4301 of Lect. Notes Comput. Sci. Springer (2006) 126–143.
Cité par Sources :