2009
DOI: 10.1007/978-3-642-03298-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Forward-Secure Group Signatures from Pairings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
10
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…In contrast, joining and key updates have linear complexity (in the number of time period T ) in Song's second scheme 2 . Our scheme also compares favorably with the proposal of Nakanishi et al [44], which results in signatures of size O(log T ) and only ensures anonymity in a model (akin to the IND-CPA scenario for public key encryption) where the adversary has no signature opening oracle. As yet another advantage over [46,44], our construction provides anonymity in a stronger sense where, as in [45,34,28], the adversary can query the opening of signatures of her choice.…”
mentioning
confidence: 65%
See 2 more Smart Citations
“…In contrast, joining and key updates have linear complexity (in the number of time period T ) in Song's second scheme 2 . Our scheme also compares favorably with the proposal of Nakanishi et al [44], which results in signatures of size O(log T ) and only ensures anonymity in a model (akin to the IND-CPA scenario for public key encryption) where the adversary has no signature opening oracle. As yet another advantage over [46,44], our construction provides anonymity in a stronger sense where, as in [45,34,28], the adversary can query the opening of signatures of her choice.…”
mentioning
confidence: 65%
“…Recently, Nakanishi et al [44] described a pairing-based forward-secure group signature providing better efficiency tradeoffs than Song's schemes. On the other hand, their scheme is presented in an analogue of the static BMW model [8] that does not consider corruptions of the group manager.…”
mentioning
confidence: 98%
See 1 more Smart Citation
“…Therefore, when some group member's singing key is disclosed, all the signatures generated during past periods remain valid, which then prevents dishonest group members from repudiating signatures by simply exposing keys. Later, Nakanishi, Hira, Funabiki [51] defined a rigourous security model of FSGS for static groups, where users are fixed throughout the scheme, and demonstrated a pairing-based construction.…”
Section: Introductionmentioning
confidence: 99%
“…As group signatures with an additional functionality, a new open functionality, which we call message-dependent opening, has been proposed in [43][44][45], where a signed message-dependent token is generated by an authority called admitter and an opener who has the opening key can open the group signatures using the corresponding token. Forward secure group signature schemes have been proposed [46][47][48][49], where users can update their secret signing key periodically, and group signatures made by the secret keys of previous periods remain secure even if a secret key is exposed. Revocable group signature schemes with backward unlinkability have been proposed [5,9,10,18], where even after a user is revoked, group signatures made by this user before the revocation remain anonymous.…”
Section: Introductionmentioning
confidence: 99%