Research on anonymous signatures and group signatures

In this paper, we analyze the conventional group signature schemes, and propose the notion of conflict of authenticated contents which implies the unconquerable drawbacks of the current group signature schemes and threshold signature schemes. We discuss an important problem of group signature, that is, whether the group signature is produced on behalf of the group or on behalf of its members, and consider that the group signatures should be produced on behalf of the group. A new kind of signature scheme, which is called anonymous signatures, has been proposed. And we indicate that the previously proposed group signature is actually a kind of anonymous signatures. In order to realize the anonymous signatures, we design two kinds of implementation schemes, whose performances are analyzed and compared. Finally, we introduce the new notion of real group signatures, describe its characteristics, present one realization based on pivot threshold scheme which we designed to solve the conflict of authenticated contents problem.

[1]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[2]  Tzonelih Hwang,et al.  Group-oriented undeniable signature schemes with a trusted center , 1999, Comput. Commun..

[3]  Alfred Menezes,et al.  Security of Signature Schemes in a Multi-User Setting , 2004, Des. Codes Cryptogr..

[4]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[5]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[6]  Gene Tsudik,et al.  Some Open Issues and New Directions in Group Signatures , 1999, Financial Cryptography.

[7]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[8]  Yvo Desmedt,et al.  Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.

[9]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[10]  Marc Joye,et al.  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Chin-Chen Chang,et al.  A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme , 2006, UIC.

[13]  Jinyuan You,et al.  Group signature schemes with forward secure properties , 2005, Appl. Math. Comput..

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.

[16]  Chin-Chen Chang,et al.  Threshold signature schemes with traceable signers in group communications , 1998, Comput. Commun..