- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
改良NR署名を用いた匿名性強化型グループ署名
-
- UMEDA Kozue
- School of Information Science, Japan Advanced Institute of Science and Technology
-
- MIYAJI Atsuko
- School of Information Science, Japan Advanced Institute of Science and Technology
Bibliographic Information
- Other Title
-
- A privacy-enhanced group signature scheme based on a modified Nyberg-Rueppel signature
Search this article
Description
グループ署名とは, グループのメンバであれば誰でもそのグループを代表して匿名で署名できる手法である.また, グループ管理者は, 問題が生じた場合には署名者を特定することができる署名者追跡機能を持っている.このため, 署名者追跡を行う管理者に対する匿名性はない.また, 証明書削除リスト(CRL)を用いたメンバ削除機能をもつグループ署名では, CRLを生成する管理者に対しても匿名性がない.本研究では, グループ管理者に対する匿名性を強化したグループ署名を提案する.提案方式では, 署名者追跡およびメンバ削除を行う管理者を同等かつ独立な2つの管理者に分割し, 単独の管理者に対する匿名性を実現する.また, メンバ登録も2つの管理者の協力により行われなければならない.このため, メンバ登録に用いる署名方式として(2, 2)閾値NR署名を提案する.
A group signature, proposed by Chaum and van Heyst, allows a group member to sign messages anonymously on behalf of the group. A group signature has a feature of tracing, that is, the identity of a signer can be revealed by a designated entity in case of dispute. The function of tracing spoils the property of anonymity to the designated entity because he can identify the signer of a group signature by using the tracing algorithm. To enhance the property of anonymity to one entity, a tracing manager is often introduced independently to the group manager, but this means that the tracing manager spoils the property of anonymity. In case of group signature with a CRL-based revocation scheme, the revocation function also spoils the property of anonymity to a designated entity. To sum up, there has been a single entity who can break the anonymity for any group signature scheme. In this paper, we present a privacy-enhanced group signature scheme with CRL-based revocation by introducing an idea of the threshold cryptosystems. We divide one group manager into two equal and independent managers. Our scheme satisfies the property of anonymity to any single group manager unless both are collude.
Journal
-
- Technical report of IEICE. ISEC
-
Technical report of IEICE. ISEC 105 (290), 79-86, 2005-09-09
The Institute of Electronics, Information and Communication Engineers
- Tweet
Details 詳細情報について
-
- CRID
- 1573105977175904000
-
- NII Article ID
- 110003298685
-
- NII Book ID
- AN10060811
-
- Text Lang
- en
-
- Data Source
-
- CiNii Articles