Cryptographic primitives | Public-key cryptography | Digital signature schemes

Group signature

A group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. The concept was first introduced by David Chaum and Eugene van Heyst in 1991. For example, a group signature scheme could be used by an employee of a large company where it is sufficient for a verifier to know a message was signed by an employee, but not which particular employee signed it. Another application is for keycard access to restricted areas where it is inappropriate to track individual employee's movements, but necessary to secure areas to only employees in the group. Essential to a group signature scheme is a group manager, who is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. In some systems the responsibilities of adding members and revoking signature anonymity are separated and given to a membership manager and revocation manager respectively. Many schemes have been proposed, however all should follow these basic requirements: Soundness and completenessValid signatures by group members always verify correctly, and invalid signatures always fail verification.UnforgeableOnly members of the group can create valid group signatures.AnonymityGiven a message and its signature, the identity of the individual signer cannot be determined without the group manager's secret key.TraceabilityGiven any valid signature, the group manager should be able to trace which user issued the signature. (This and the previous requirement imply that only the group manager can break users' anonymity.)UnlinkabilityGiven two messages and their signatures, we cannot tell if the signatures were from the same signer or not.No framingEven if all other group members (and the managers) collude, they cannot forge a signature for a non-participating group member.Unforgeable tracing verificationThe revocation manager cannot falsely accuse a signer of creating a signature he did not create.Coalition resistanceA colluding subset of group members cannot generate a valid signature that the group manager cannot link to one of the colluding group members. The ACJT 2000, BBS04, and BS04 (in CCS) group signature schemes are some of the state of the art. (Note: this might be an incomplete list.) Boneh, Boyen and Shacham published in 2004 (BBS04, Crypto04) is a novel group signature scheme based on bilinear maps. Signatures in this scheme are approximately the size of a standard RSA signature (around 200 bytes). The security of the scheme is proven in the random oracle model and relies on the (SDH) and a new assumption in bilinear groups called the Decision linear assumption (DLin). A more formal definition that is geared towards provable security was given by Bellare, Micciancio and Warinschi. (Wikipedia).

Video thumbnail

Definition of a group Lesson 24

In this video we take our first look at the definition of a group. It is basically a set of elements and the operation defined on them. If this set of elements and the operation defined on them obey the properties of closure and associativity, and if one of the elements is the identity el

From playlist Abstract algebra

Video thumbnail

Digital Signatures: Part 1

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Digital Signatures: Part 2

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Visual Group Theory, Lecture 1.4: Group presentations

Visual Group Theory, Lecture 1.4: Group presentations We begin this lecture by learning how to take a Cayley diagram and label its nodes with the elements of a group. Such a labeled diagram can function as a "group calculator". It leads to the notion of a "group presentation", which is a

From playlist Visual Group Theory

Video thumbnail

Visual Group Theory, Lecture 1.6: The formal definition of a group

Visual Group Theory, Lecture 1.6: The formal definition of a group At last, after five lectures of building up our intuition of groups and numerous examples, we are ready to present the formal definition of a group. We conclude by proving several basic properties that are not built into t

From playlist Visual Group Theory

Video thumbnail

What is a Group? | Abstract Algebra

Welcome to group theory! In today's lesson we'll be going over the definition of a group. We'll see the four group axioms in action with some examples, and some non-examples as well which violate the axioms and are thus not groups. In a fundamental way, groups are structures built from s

From playlist Abstract Algebra

Video thumbnail

Group Theory III Cayley Tables

Why are groups so popular? Well, in part it is because of their ability to characterise symmetries. This makes them a powerful tool in physics, where symmetry underlies our whole understanding of the fundamental forces. In the second video of this introduction to group theory, we check th

From playlist Group Theory

Video thumbnail

Product groups

Now that we have defined and understand quotient groups, we need to look at product groups. In this video I define the product of two groups as well as the group operation, proving that it is indeed a group.

From playlist Abstract algebra

Video thumbnail

Symmetric Groups (Abstract Algebra)

Symmetric groups are some of the most essential types of finite groups. A symmetric group is the group of permutations on a set. The group of permutations on a set of n-elements is denoted S_n. Symmetric groups capture the history of abstract algebra, provide a wide range of examples in

From playlist Abstract Algebra

Video thumbnail

Fundamentals of Mathematics - Lecture 14: Signatures, Formulas, Structures, Theories, and Models

course page: http://www.uvm.edu/~tdupuy/logic/Math52-Fall2017.html videography - Eric Melton handouts - DZB, Emory

From playlist Fundamentals of Mathematics

Video thumbnail

Model Theory - part 01 - The Setup in Classical Set Valued Model Theory

Here we give the basic setup for Model Theory. I learned this from a talk Tom Scanlon gave in 2010 at CUNY.

From playlist Model Theory

Video thumbnail

Markus Banagl : The L-Homology fundamental class for singular spaces and the stratified Novikov

Abstract : An oriented manifold possesses an L-homology fundamental class which is an integral refinement of its Hirzebruch L-class and assembles to the symmetric signature. In joint work with Gerd Laures and James McClure, we give a construction of such an L-homology fundamental class for

From playlist Topology

Video thumbnail

DLP Attacks and intro to El Gamal

We cover basic attacks on the discrete logarithm problem. The El Gamal Cipher is presented. We start discussion digital signatures.

From playlist PubKey

Video thumbnail

DjangoCon US 2018 - Building Workflows With Celery by Josue Balandrano Coronel

Task Queues is a topic which most developers will eventually have to dive into, specially in today’s web development world. The idea is really simple: whenever one has any functionality which might take too long to perform, one can spawn a process which will take care of this functionality

From playlist DjangoCon US 2018

Video thumbnail

Mathematics in Cryptography II - Toni Bluher

2018 Program for Women and Mathematics Topic: Mathematics in Cryptography II Speaker: Toni Bluher Affiliation: National Security Agency Date: May 21, 2018 For more videos, please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Proper Actions and Representation Theory Part 2

Professor Toshiyuki Kobayashi, University of Tokyo, Japan

From playlist Distinguished Visitors Lecture Series

Video thumbnail

S. Filip - K3 surfaces and Dynamics (Part 1)

K3 surfaces provide a meeting ground for geometry (algebraic, differential), arithmetic, and dynamics. I hope to discuss: - Basic definitions and examples - Geometry (algebraic, differential, etc.) of complex surfaces - Torelli theorems for K3 surfaces - Dynamics on K3s (Cantat, McMullen)

From playlist Ecole d'été 2018 - Teichmüller dynamics, mapping class groups and applications

Video thumbnail

How does Schnorr Signature Work?

Describe the theoretical aspect of Schnorr digital signature.

From playlist crypto

Video thumbnail

Luca De Feo, Proving knowledge of isogenies, quaternions and signatures

VaNTAGe Seminar, November 15, 2022 License: CC-BY-NC-SA Links to some of the papers and cites mentioned in the talk: Couveignes (2006): https://eprint.iacr.org/2006/291 Fiat-Shamir (1986): https://doi.org/10.1007/3-540-47721-7_12 De Feo-Jao-Plût (2011): https://eprint.iacr.org/2011/506 B

From playlist New developments in isogeny-based cryptography

Related pages

Collusion | Ring signature | Provable security | Digital signature | Threshold cryptosystem | Multisignature