Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments

被引:4
作者
Sadiah, Shahidatul [1 ]
Nakanishi, Toru [1 ]
机构
[1] Hiroshima Univ, Dept Informat Engn, Higashihiroshima, Japan
来源
2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) | 2017年
关键词
privacy; group signatures; revocation; vector commitments;
D O I
10.1109/CANDAR.2017.23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Group signature schemes allow members to anonymously sign messages on behalf of the group. In this scheme, an efficient membership revocation is one of the important issues. The scheme proposed by Libert et al. has achieved O(1) signature and membership certificate size, O(1) signing and verification times, and O(log N) public key size, where N is the total number of members. However the Revocation List (RL) data is large, due to O(R) signatures in RL, where R is the number of revoked members. Recently, the extended scheme was proposed by reducing the RL size to O(R/T) using a vector commitment to compress revocation entries, where T is the number of compressions, while O(1) membership certificate size remains. However, this scheme has not been implemented yet, and the practicality on the computation times for concrete T is unknown. In this paper, we implemented the scheme and explore the practicality. From the experimental results, the signing time is less than 500 ms for T = 400, but the verification time is about 1.5 s. We consider that the implemented scheme is practical in a mobile environment due to lower user computation time and storage.
引用
收藏
页码:489 / 495
页数:7
相关论文
共 11 条
[1]  
Abe Masayuki., 2010, Cryptology ePrint Archive
[2]  
Akane M., 2009, IEICE T FUNDAMENTALS
[3]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177
[4]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481
[5]  
Groth J, 2008, LECT NOTES COMPUT SC, V4965, P415
[6]  
Izabachene Malika, 2011, Cryptography and Coding. 13th IMA International Conference, IMACC 2011. Proceedings, P431, DOI 10.1007/978-3-642-25516-8_26
[7]  
Libert B, 2012, LECT NOTES COMPUT SC, V7417, P571
[8]  
Libert B, 2010, LECT NOTES COMPUT SC, V5978, P499, DOI 10.1007/978-3-642-11799-2_30
[9]  
Nakanishi T., 2013, P 16 ANN INT C INF S, P435
[10]  
Naor D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P41