How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Leak-Free Group Signatures with Immediate Revocation
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Quasi-efficient revocation of group signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On computable isomorphisms in efficient asymmetric pairing-based systems
Discrete Applied Mathematics
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Proceedings of the 14th ACM conference on Computer and communications security
A short anonymously revocable group signature scheme from decision linear assumption
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Universal Accumulators with Efficient Nonmembership Proofs
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Discrete Applied Mathematics
PEREA: towards practical TTP-free revocation in anonymous authentication
Proceedings of the 15th ACM conference on Computer and communications security
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Another Approach to Pairing Computation in Edwards Coordinates
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
More Efficient VLR Group Signature Satisfying Exculpability
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Zero-Knowledge Proofs with Witness Elimination
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Efficient user revocation for privacy-aware PKI
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Practical Short Signature Batch Verification
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Leak-free mediated group signatures
Journal of Computer Security
Forward-Secure Group Signatures from Pairings
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Efficient Traceable Signatures in the Standard Model
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Security, privacy, and accountability in wireless access networks
IEEE Wireless Communications
An autonomous road side infrastructure based system in secure VANETs
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Dynamic fully forward-secure group signatures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Cryptographic role-based security mechanisms based on role-key hierarchy
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Full-domain subgroup hiding and constant-size group signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Short group signature without random oracles
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Hidden identity-based signatures
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Jack: scalable accumulator-based nymble system
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
An anonymous attestation scheme with optional traceability
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
ACM Transactions on Information and System Security (TISSEC)
The Fiat-Shamir transform for group and ring signature schemes
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Get shorty via group signatures without encryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Solving revocation with efficient update of anonymous credentials
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
ProvSec'10 Proceedings of the 4th international conference on Provable security
Efficient traceable signatures in the standard model
Theoretical Computer Science
Shorter verifier-local revocation group signature with backward unlinkability
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Relations among privacy notions
ACM Transactions on Information and System Security (TISSEC)
An electronic and secure automatic fare collection system with revocable anonymity for users
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Group-oriented fair exchange of signatures
Information Sciences: an International Journal
Double-trapdoor anonymous tags for traceable signatures
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Journal of Network and Computer Applications
Efficient proofs of attributes in pairing-based anonymous credential system
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
A new revocable secret handshake scheme with backward unlinkability
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Efficient pairing computation on Elliptic curves in Hessian form
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
ACM Transactions on Information and System Security (TISSEC)
Analysis of revocation strategies for anonymous Idemix credentials
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
An anonymous authentication scheme for identification card
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Off-Line group signatures with smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Verifier-Local revocation group signature schemes with backward unlinkability from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Group signature schemes with membership revocation for large groups
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Compact group signatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A short verifier-local revocation group signature scheme with backward unlinkability
IWSEC'06 Proceedings of the 1st international conference on Security
IWSEC'06 Proceedings of the 1st international conference on Security
Shorter verifier-local revocation group signatures from bilinear maps
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Key exchange with anonymous authentication using DAA-SIGMA protocol
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Revocation of direct anonymous attestation
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Chosen-Ciphertext security from tag-based encryption
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Fully forward-secure group signatures
Cryptography and Security
Dynamic secure cloud storage with provenance
Cryptography and Security
Plaintext-Checkable encryption
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Group signature with constant revocation costs for signers and verifiers
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Scalable group signatures with revocation
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
A revocable group signature scheme with the property of hiding the number of revoked users
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Group signatures with controllable linkability for dynamic membership
Information Sciences: an International Journal
Fully anonymous attribute tokens from lattices
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Practical privacy for value-added applications in vehicular ad hoc networks
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
International Journal of Business Data Communications and Networking
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
Group signatures with message-dependent opening
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Efficient group signatures in the standard model
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Anonymously sharing Flickr pictures with facebook friends
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Group-signature schemes on constrained devices: the gap between theory and practice
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is critical to the security of such systems. We construct a short group signature scheme that supports Verifier-Local Revocation (VLR). In this model, revocation messages are only sent to signature verifiers (as opposed to both signers and verifiers). Consequently there is no need to contact individual signers when some user is revoked. This model is appealing for systems providing attestation capabilities. Our signatures are as short as standard RSA signatures with comparable security. Security of our group signature (in the random oracle model) is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear groups. We give a precise model for VLR group signatures and discuss its implications.