2022
DOI: 10.15803/ijnc.12.2_493
|View full text |Cite
|
Sign up to set email alerts
|

Group Signatures with Designated Traceability over Openers’ Attributes

Abstract: We propose a group signature scheme with a function of designated traceability; each opener has attributes, and a signer of a group signature can be traced by only the openers whose attributes satisfy the boolean formula designated by the signer. We describe syntax and security definitions of the scheme. Then we give a generic construction of the scheme by employing a ciphertext-policy attribute-based encryption scheme.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…In this section, we show the correctness and security properties of the scheme. The security proofs follow the proofs given by Bellare et al 2 and Anada et al 20 However, since we decentralized the tracing key generation and used both PKE and CP-ABE schemes, there are some differences in the proof of anonymity. Therefore, we detail the anonymity proof in this section.…”
Section: Correctness and Securitymentioning
confidence: 98%
See 4 more Smart Citations
“…In this section, we show the correctness and security properties of the scheme. The security proofs follow the proofs given by Bellare et al 2 and Anada et al 20 However, since we decentralized the tracing key generation and used both PKE and CP-ABE schemes, there are some differences in the proof of anonymity. Therefore, we detail the anonymity proof in this section.…”
Section: Correctness and Securitymentioning
confidence: 98%
“…Figures 3 and 4 show the construction of algorithms of user-joining and tracer key generation protocols, respectively. For the building of the scheme we referred to the construction given by Bellare et al 2 and Anada et al 16,20 The algorithm Setup produces public and secret keys for the attributes in the universal attribute set Att. We assume the tracers will receive attribute-secret keys only for their possessing attributes.…”
Section: Constructionmentioning
confidence: 99%
See 3 more Smart Citations