TY - GEN
T1 - Some open issues and new directions in group signatures
AU - Ateniese, Giuseppe
AU - Tsudik, Gene
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1999.
PY - 1999
Y1 - 1999
N2 - Group signatures allow any member of a potentially large group to sign on behalf of the group. Group signatures are anonymous and unlinkable for everyone with the exception of a designated group manager who can co-relate signatures and reveal the identity of the actual signer. At the same time, no one (including a group manager) can misattribute a valid group signature. Group signatures are claimed to have many practical applications in e-commerce as well as in military and legal fields. Despite some interesting and eclectic results, group signatures remain confined to academic literature. The focus of this paper is two-fold. First, it discusses certain issues that stand in the way of practical applications of group signatures and uses the example of on recent group signature scheme to illustrate certain problems. Second, this paper (informally) introduces some practical security services that can be constructed using any group signature scheme. Sample realizations of these services are provided.
AB - Group signatures allow any member of a potentially large group to sign on behalf of the group. Group signatures are anonymous and unlinkable for everyone with the exception of a designated group manager who can co-relate signatures and reveal the identity of the actual signer. At the same time, no one (including a group manager) can misattribute a valid group signature. Group signatures are claimed to have many practical applications in e-commerce as well as in military and legal fields. Despite some interesting and eclectic results, group signatures remain confined to academic literature. The focus of this paper is two-fold. First, it discusses certain issues that stand in the way of practical applications of group signatures and uses the example of on recent group signature scheme to illustrate certain problems. Second, this paper (informally) introduces some practical security services that can be constructed using any group signature scheme. Sample realizations of these services are provided.
KW - Coalition attacks
KW - Digital signatures
KW - Group signatures
KW - Multi-group signatures
KW - Public-key cryptography
KW - Revocation
KW - Sub-group signatures
UR - http://www.scopus.com/inward/record.url?scp=84921023488&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921023488&partnerID=8YFLogxK
U2 - 10.1007/3-540-48390-x_15
DO - 10.1007/3-540-48390-x_15
M3 - Conference contribution
AN - SCOPUS:84921023488
SN - 3540663622
SN - 9783540663621
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 196
EP - 211
BT - Financial Cryptography - 3rd International Conference, FC 1999, Proceedings
A2 - Franklin, Matthew
T2 - 3rd International Conference on Financial Cryptography, FC 1999
Y2 - 22 February 1999 through 25 February 1999
ER -