Communications of the ACM
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Security of Signature Schemes in a Multi-User Setting
Designs, Codes and Cryptography
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
New directions in cryptography
IEEE Transactions on Information Theory
Research note: Group-oriented undeniable signature schemes with a trusted center
Computer Communications
Hi-index | 0.25 |
In this paper, we analyze the conventional group signature schemes, and propose the notion of conflict of authenticated contents which implies the unconquerable drawbacks of the current group signature schemes and threshold signature schemes. We discuss an important problem of group signature, that is, whether the group signature is produced on behalf of the group or on behalf of its members, and consider that the group signatures should be produced on behalf of the group. A new kind of signature scheme, which is called anonymous signatures, has been proposed. And we indicate that the previously proposed group signature is actually a kind of anonymous signatures. In order to realize the anonymous signatures, we design two kinds of implementation schemes, whose performances are analyzed and compared. Finally, we introduce the new notion of real group signatures, describe its characteristics, present one realization based on pivot threshold scheme which we designed to solve the conflict of authenticated contents problem.