Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Research Article

Breaking and Building of Group Inside Signature

Download
486 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-05284-2_19,
        author={S. Vivek and S. Selvi and S. Nath and C. Rangan},
        title={Breaking and Building of Group Inside Signature},
        proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={Cryptanalysis Group Inside Signature Broadcast Group Oriented Signature Adaptable Designated Group Signature Provable Security Random Oracle model},
        doi={10.1007/978-3-642-05284-2_19}
    }
    
  • S. Vivek
    S. Selvi
    S. Nath
    C. Rangan
    Year: 2012
    Breaking and Building of Group Inside Signature
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-05284-2_19
S. Vivek1,*, S. Selvi1,*, S. Nath1,*, C. Rangan1,*
  • 1: Indian Institute of Technology Madras
*Contact email: svivek@cse.iitm.ac.in, sharmila@cse.iitm.ac.in, gopinath@cse.iitm.ac.in, prangan@cse.iitm.ac.in

Abstract

Group Inside Signature (GIS) is a signature scheme that allows the signer to designate his signature to be verified by a group of people. Members other than the designated group cannot verify the signature generated by the signer. In Broadcast Group Oriented Signature (BGOS), a user from one group can designate his signature to be verified by members of another group. An Adaptable Designated Group Signature (ADGS), is one in which an user can designate his signature to be verified by a selected set of members who are from different groups. The two GIS schemes [5], [6] and the BGOS scheme [7], we consider are certificateless schemes and the ADGS scheme [8] which we consider here is an identity based scheme. In this paper, we present the cryptanalysis of all the four schemes that appeared in [5], [6], [7] and [8]. We also present a new identity based ADGS (N-ADGS) scheme and prove its security in the random oracle model. The existing model described in [8] for ADGS did not consider unlinkability which is one of the key properties required for ADGS.We provide the security model for unlinkability and also prove our scheme is unlinkable.