How to Convert any Digital Signature Scheme into a Group Signature Scheme

نویسنده

  • Holger Petersen
چکیده

Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. In this paper we show, how any digital signature scheme can be converted into a group signature scheme. This solves an open problem posed by Chaum and van Heijst. To obtain this result, the encrypted identity of the signer is signed together with the message. The correct-ness of the encryption is ensured by using the technique of an indirect discourse proof, introduced in FrTY96]. It proves that the group center has the future capability to decrypt the signers identity. Furthermore, an eecient extension to the general case of a (t; n) threshold group signature scheme with 2 t < n anonymous signers is described. Finally, we discuss some extensions of both schemes, like selective and total conversion into ordinary digital signatures. Abstract. Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. In this paper we show, how any digital signature scheme can be converted into a group signature scheme. This solves an open problem posed by Chaum and van Heijst. To obtain this result, the encrypted identity of the signer is signed together with the message. The correct-ness of the encryption is ensured by using the technique of an indirect discourse proof, introduced in FrTY96]. It proves that the group center has the future capability to decrypt the signers identity. Furthermore, an eecient extension to the general case of a (t; n) threshold group signature scheme with 2 t < n anonymous signers is described. Finally, we discuss some extensions of both schemes, like selective and total conversion into ordinary digital signatures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

How to convert any digital signature

Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. In this paper we show, how any digital signature scheme can be converted into a group signature scheme. This solves an open problem posed by Chaum and van Heijst. To obtain this result, the encrypted identity of the signer is signed together with the message. The c...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997