Leak-free mediated group signatures

نویسندگان

  • Xuhua Ding
  • Gene Tsudik
  • Shouhuai Xu
چکیده

Group signatures are a useful cryptographic construct for privacy-preserving non-repudiable authentication, and there have been many group signature schemes. In this paper, we introduce a variant of group signatures that offers two new security properties called leak-freedom and immediate-revocation. Intuitively, the former ensures that an insider (i.e., an authorized but malicious signer) be unable to convince an outsider (e.g., signature receiver) that she indeed signed a certain message; whereas the latter ensures that the authorization for a user to issue group signatures can be immediately revoked ∗An earlier version appeared in the Proceedings of IEEE ICDCS’04 [32].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Leak a Secret

In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign ...

متن کامل

How to Leak a Secret: Theory and Applications of Ring Signatures

In this work we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign a...

متن کامل

Hash Families and Cover-Free Families with Cryptographic Applications

This thesis is focused on hash families and cover-free families and their application to problems in cryptography. We present new necessary conditions for generalized separating hash families, and provide new explicit constructions. We then consider three cryptographic applications of hash families and cover-free families. We provide a stronger definition of anonymity in the context of shared s...

متن کامل

Vascularized Flaps versus Free Grafts in Endoscopic Reconstruction of Large Skull Base Defects

Background: The last decades have witnessed remarkable progress in the field of endoscopic skull base surgery. The nose has become an established route for addressing different skull base lesions. The reconstruction after resection is a critical step for optimum surgical outcome. Objective: Evaluation of the difference in the clinical outcomes between the use of vascularized flaps and free graf...

متن کامل

Contained anastomotic leaks after colorectal surgery: are we too slow to act?

HYPOTHESIS Contained and free anastomotic leaks, which occur in a small percentage of patients after colorectal surgery, are different clinical entities and consequently should be managed differently. DESIGN Retrospective medical record review. SETTING Academic medical center. PATIENTS Patients who underwent colectomy with primary anastomosis (N = 4019) between January 1, 1992, and Decemb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2009