Bootle, J;
Cerulli, A;
Chaidos, P;
Ghadafi, E;
Groth, J;
(2016)
Foundations of Fully Dynamic Group Signatures.
In: Manulis, M and Sadeghi, AR and Schneider, S, (eds.)
ACNS 2016: Applied Cryptography and Network Security.
(pp. pp. 117-136).
Springer International Publishing AG
Preview |
Text
Groth_Main.pdf - Accepted Version Download (453kB) | Preview |
Abstract
Group signatures are a central cryptographic primitive that has received a considerable amount of attention from the cryptographic community. They allow members of a group to anonymously sign on behalf of the group. Membership is overseen by a designated group manager. There is also a tracing authority that can revoke anonymity by revealing the identity of the signer if and when needed, to enforce accountability and deter abuse. For the primitive to be applicable in practice, it needs to support fully dynamic groups, i.e. users can join and leave at any time. In this work we take a close look at existing security definitions for fully dynamic group signatures. We identify a number of shortcomings in existing security definitions and fill the gap by providing a formal rigorous security model for the primitive. Our model is general and is not tailored towards a specific design paradigm and can therefore, as we show, be used to argue about the security of different existing constructions following different design paradigms. Our definitions are stringent and when possible incorporate protection against maliciously chosen keys. In the process, we identify a subtle issue inherent to one design paradigm, where new members might try to implicate older ones by means of back-dated signatures. This is not captured by existing models. We propose some inexpensive fixes for some existing constructions to avoid the issue.
Type: | Proceedings paper |
---|---|
Title: | Foundations of Fully Dynamic Group Signatures |
Event: | 14th International Conference on Applied Cryptography and Network Security (ACNS) |
Location: | Guildford, UK |
Dates: | 19 June 2016 - 22 June 2016 |
ISBN-13: | 9783319395548 |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1007/978-3-319-39555-5_7 |
Publisher version: | http://dx.doi.org/10.1007/978-3-319-39555-5_7 |
Language: | English |
Additional information: | © Springer International Publishing Switzerland 2016. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-39555-5_7 |
Keywords: | Science & Technology, Technology, Computer Science, Information Systems, Computer Science, Theory & Methods, Computer Science, Group signatures, Security definitions, VERIFIER-LOCAL REVOCATION, SIZE GROUP SIGNATURES, BILINEAR MAPS, BACKWARD UNLINKABILITY, ANONYMOUS CREDENTIALS, EFFICIENT REVOCATION, RANDOM ORACLES, SCHEMES, ACCUMULATORS, PAIRINGS |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/1501202 |
Archive Staff Only
View Item |