Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Step-out group signatures
Klonowski M., Krzywiecki Ł., Kutyłowski M., Lauks A. Computing85 (1-2):137-151,2009.Type:Article
Date Reviewed: Oct 19 2010

Chaum and van Heyst’s classical group signature [1] allows for the possibility of creating a signature by a group member, with a hidden identity. However, in this scheme, the trusted authority person can make the identity of the signer known. It is an undesirable property of the system, and much effort has been expended to solve this problem. There is a trend toward the elimination of the trusted authority person. One of the methods proposed in the literature is the democratic group signature scheme [2].

In this paper, the authors propose a step-out group signature scheme [3]. The idea of the method is that, for the set of all registered users Ω, the scheme allows for the following:

(1) “Any set of up to n users from Ω can collectively sign a document M in the way that convinces a verifier that a subset d users of Ω has signed M. ... The signature is denoted by σ(M).”

(2) “Any user from Ω that has participated in creation of a signature σ(M) ... can prove that he is one of the creators of σ(M).”

(3) “Any user from Ω that was not taking part in creating σ(M) can prove this by executing a step-out procedure.”

The paper proposes some further improvements to the scheme. The construction is based on Lagrangian interpolation and some anonymous key revocation techniques [4]. Klonowski et al. provide a rigorous description of the algorithms and a clear formulation of the details.

Reviewer:  Krzysztof Szajowski Review #: CR138497 (1103-0306)
1) Chaum, D.; van Heyst, E. Advances in cryptology (LNCS 1440). Springer, , 1991.
2) Manulis, M.; Sadeghi, A.-R.; Schwenk, J. Information security practice and experience (LNCS 3903). Springer, , 2006.
3) Klonowski, M.; Krzywiecki, Ł.; Kutyłowski, M.; Lauks, A. Mathematical foundations of computer science (LNCS 5162). Springer, , 2008.
4) Krzywiecki, Ł.; Kubiak, P.; Kutyłowski, M. Information security and cryptology (LNCS 4318). Springer, , 2006.
Bookmark and Share
  Reviewer Selected
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy