- Group signature
A Group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. The concept was first introduced by
David Chaum andEugene van Heyst in 1991. For example, a group signature scheme could be used by an employee of a large company where it is sufficient for a verifier to know a message was signed by an employee, but not the particular employee who signed it. Another application is forkeycard access to restricted areas where it is inappropriate to track individual employee's movements, but necessary to secure areas to only employees in the group.Essential to a group signature scheme is a "group manager", who is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. In some systems the responsibilities of adding members and revoking signature anonymity are separated and given to a membership manager and revocation manager respectively. Many schemes have been proposed, however all should follow these basic requirements:
*Soundness and Completeness: Valid signatures by group members always verify correctly, and invalid signatures always fail verification.
*Unforgeable: Only members of the group can create valid group signatures.
*Signer ambiguous: Given a message and its signature, the identity of the individual signer cannot be determined without the revocation manager'ssecret key .
*Unlinkability: Given two messages and their signatures, we cannot tell if the signatures were from the same signer or not.
*No Framing: Even if all other group members (and the managers) collude, they cannot forge a signature for a non-participating group member.
*Unforgeable tracing verification: The revocation manager cannot falsely accuse a signer of creating a signature he did not create.The ACJT 2000, BBS04 (in Crypto), BS04 (in CCS) group signature schemes are the state of the art. (Note: this might be an incomplete list)
A more formal definition that is geared towards
provable security was given by Bellare, Micciancio and Warinschi.See also
*
Ring signature : A similar system that excludes the requirement of a group manager and provides true anonymity for signers.References
* cite conference
author=D. Chaum and E. van Heyst
title=Group signatures
booktitle=Advances in Cryptology — EUROCRYPT ’91, volume 547 of Lecture Notes in Computer Science
year=1991
pages=257-265
* J. Camenisch, M. Michels. "A Group Signature Scheme Based on an RSA-Variant". 1998 (http://www.brics.dk/RS/98/27/BRICS-RS-98-27.pdf)* M. Bellare, H. Shi and C. Zhang. "Foundations of Group Signatures: The Case of Dynamic Groups". Topics in Cryptology - CT-RSA 2005 Proceedings, Lecture Notes in Computer Science Vol. 3376, A. Menezes ed, Springer-Verlag, 2005. (http://www-cse.ucsd.edu/users/mihir/papers/dgs.html)
* M. Bellare, D. Micciancio and B. Warinschi. "Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions". Advances in Cryptology - Eurocrypt 2003 Proceedings, Lecture Notes in Computer Science Vol. 2656, E. Biham ed, Springer-Verlag, 2003. (http://www-cse.ucsd.edu/users/mihir/papers/gs.html)
Wikimedia Foundation. 2010.