메뉴 건너뛰기




Volumn 7708 LNCS, Issue , 2013, Pages 270-294

Group signatures with message-dependent opening

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84884472675     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36334-4_18     Document Type: Conference Paper
Times cited : (51)

References (42)
  • 1
    • 33646840349 scopus 로고    scopus 로고
    • On the minimal assumptions of group signature schemes
    • López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. Springer, Heidelberg
    • Abdalla, M., Warinschi, B.: On the Minimal Assumptions of Group Signature Schemes. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 1-13. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3269 , pp. 1-13
    • Abdalla, M.1    Warinschi, B.2
  • 2
    • 77956996315 scopus 로고    scopus 로고
    • Structure- preserving signatures and commitments to group elements
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure- Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 209-236
    • Abe, M.1    Fuchsbauer, G.2    Groth, J.3    Haralambiev, K.4    Ohkubo, M.5
  • 3
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of kurosawa-Desmedt KEM
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 6
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Ateniese, G., Camenisch, J.L., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.L.2    Joye, M.3    Tsudik, G.4
  • 7
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 8
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
    • Bellare, M., Shi, H., Zhang, C.: Foundations of Group Signatures: The Case of Dynamic Groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136-153. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 9
    • 45749116570 scopus 로고    scopus 로고
    • Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures
    • Bellare, M., Shoup, S.: Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures. IET Information Security 2(2), 47-63 (2008)
    • (2008) IET Information Security , vol.2 , Issue.2 , pp. 47-63
    • Bellare, M.1    Shoup, S.2
  • 10
    • 77958065231 scopus 로고    scopus 로고
    • Get shorty via group signatures without encryption
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Bichsel, P., Camenisch, J., Neven, G., Smart, N.P., Warinschi, B.: Get Shorty via Group Signatures without Encryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 381-398. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 381-398
    • Bichsel, P.1    Camenisch, J.2    Neven, G.3    Smart, N.P.4    Warinschi, B.5
  • 11
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 14
    • 33746042155 scopus 로고    scopus 로고
    • Compact group signatures without random oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Boyen, X., Waters, B.: Compact Group Signatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 427-444. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 427-444
    • Boyen, X.1    Waters, B.2
  • 15
    • 37149007674 scopus 로고    scopus 로고
    • Full-domain subgroup hiding and constant-size group signatures
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Boyen, X., Waters, B.: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 1-15
    • Boyen, X.1    Waters, B.2
  • 16
    • 84869520399 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. Cryptology ePrint Archive, Report 2008/375 (2008), http://eprint.iacr. org/
    • (2008) Cryptology EPrint Archive, Report 2008/375
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 17
    • 67650691588 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Camenisch, J., Chandran, N., Shoup, V.: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 351-368
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 18
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 84921060028 scopus 로고    scopus 로고
    • Separability and efficiency for generic group signature schemes (extended abstract)
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Camenisch, J., Michels, M.: Separability and Efficiency for Generic Group Signature Schemes (Extended Abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 413-785. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 413-785
    • Camenisch, J.1    Michels, M.2
  • 20
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 21
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 22
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 23
    • 84887276320 scopus 로고    scopus 로고
    • Dynamic fully anonymous short group signatures
    • Nguyên, P.Q. (ed.) VIETCRYPT 2006. Springer, Heidelberg
    • Delerablée, C., Pointcheval, D.: Dynamic Fully Anonymous Short Group Signatures. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193-210. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 193-210
    • Delerablée, C.1    Pointcheval, D.2
  • 24
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 25
    • 26444446884 scopus 로고    scopus 로고
    • An efficient group signature scheme from bilinear maps
    • Boyd, C., Nieto, J.G. (eds.) ACISP 2005. Springer, Heidelberg
    • Furukawa, J., Imai, H.: An Efficient Group Signature Scheme from Bilinear Maps. In: Boyd, C., Nieto, J.G. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 455-467. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3574 , pp. 455-467
    • Furukawa, J.1    Imai, H.2
  • 26
    • 79955538557 scopus 로고    scopus 로고
    • Groth-sahai proofs revisited
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Ghadafi, E., Smart, N.P.,Warinschi, B.: Groth-Sahai Proofs Revisited. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 177-192. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 177-192
    • Ghadafi, E.1    Smart, N.P.2    Warinschi, B.3
  • 27
    • 77649262306 scopus 로고    scopus 로고
    • Simulation-sound NIZK proofs for a practical language and constant size group signatures
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 444-459
    • Groth, J.1
  • 28
    • 38149097733 scopus 로고    scopus 로고
    • Fully anonymous group signatureswithout random oracles
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Groth, J.: Fully Anonymous Group SignaturesWithout Random Oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164-180. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 164-180
    • Groth, J.1
  • 29
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 30
    • 32244433334 scopus 로고    scopus 로고
    • κ-resilient identity-based encryption in the standard model
    • Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
    • Heng, S.-H., Kurosawa, K.: κ-Resilient Identity-Based Encryption in the Standard Model. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 67-80. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 67-80
    • Heng, S.-H.1    Kurosawa, K.2
  • 31
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Kiayias, A., Tsiounis, Y., Yung, M.: Traceable Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571-589. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 32
    • 29244453439 scopus 로고    scopus 로고
    • Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders
    • Kiayias, A., Yung, M.: Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076 (2004), http://eprint.iacr.org/
    • (2004) Cryptology EPrint Archive, Report 2004/076
    • Kiayias, A.1    Yung, M.2
  • 33
    • 24944524118 scopus 로고    scopus 로고
    • Group signatures with efficient concurrent join
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Kiayias, A., Yung, M.: Group Signatures with Efficient Concurrent Join. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 198-214. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 198-214
    • Kiayias, A.1    Yung, M.2
  • 34
    • 84957649548 scopus 로고    scopus 로고
    • Identity escrow
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169-185. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 169-185
    • Kilian, J.1    Petrank, E.2
  • 35
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-ciphertext security from tag-based encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 36
    • 30744458170 scopus 로고    scopus 로고
    • Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract)
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • MacKenzie, P.D., Reiter, M.K., Yang, K.: Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 171-190. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 171-190
    • Mackenzie, P.D.1    Reiter, M.K.2    Yang, K.3
  • 37
    • 70350666379 scopus 로고    scopus 로고
    • On the theoretical gap between group signatures with and without unlinkability
    • Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
    • Ohtake, G., Fujii, A., Hanaoka, G., Ogawa, K.: On the Theoretical Gap between Group Signatures with and without Unlinkability. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 149-166. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 149-166
    • Ohtake, G.1    Fujii, A.2    Hanaoka, G.3    Ogawa, K.4
  • 38
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 39
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
    • IEEE Computer Society
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553. IEEE Computer Society (1999)
    • (1999) 40th Annual Symposium on Foundations of Computer Science , pp. 543-553
    • Sahai, A.1
  • 40
    • 85180530788 scopus 로고    scopus 로고
    • A contractual anonymity system
    • The Internet Society
    • Schwartz, E.J., Brumley, D., McCune, J.M.: A contractual anonymity system. In: NDSS 2010. The Internet Society (2010)
    • (2010) NDSS 2010
    • Schwartz, E.J.1    Brumley, D.2    McCune, J.M.3
  • 41
    • 38049124394 scopus 로고    scopus 로고
    • A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/
    • (2007) Cryptology EPrint Archive, Report 2007/074
    • Shacham, H.1
  • 42
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.