Home > Research > Publications & Outputs > Selectively linkable group signatures- stronger...

Links

Text available via DOI:

View graph of relations

Selectively linkable group signatures- stronger security and preserved verifiabiity

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Selectively linkable group signatures- stronger security and preserved verifiabiity. / Fraser, Ashley; Grams, Lydia; Lehman, Anja.
Cryptology and Network Security (CANS 2021). ed. / Mauro Conti; Marc Stevens; Stephan Krenn. Cham: Springer, 2021. p. 200-221.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Fraser, A, Grams, L & Lehman, A 2021, Selectively linkable group signatures- stronger security and preserved verifiabiity. in M Conti, M Stevens & S Krenn (eds), Cryptology and Network Security (CANS 2021). Springer, Cham, pp. 200-221. https://doi.org/10.1007/978-3-030-92548-2_11

APA

Fraser, A., Grams, L., & Lehman, A. (2021). Selectively linkable group signatures- stronger security and preserved verifiabiity. In M. Conti, M. Stevens, & S. Krenn (Eds.), Cryptology and Network Security (CANS 2021) (pp. 200-221). Springer. https://doi.org/10.1007/978-3-030-92548-2_11

Vancouver

Fraser A, Grams L, Lehman A. Selectively linkable group signatures- stronger security and preserved verifiabiity. In Conti M, Stevens M, Krenn S, editors, Cryptology and Network Security (CANS 2021). Cham: Springer. 2021. p. 200-221 doi: 10.1007/978-3-030-92548-2_11

Author

Fraser, Ashley ; Grams, Lydia ; Lehman, Anja. / Selectively linkable group signatures- stronger security and preserved verifiabiity. Cryptology and Network Security (CANS 2021). editor / Mauro Conti ; Marc Stevens ; Stephan Krenn. Cham : Springer, 2021. pp. 200-221

Bibtex

@inproceedings{86c65b2a3e9f47e6adebeb140fc4bdeb,
title = "Selectively linkable group signatures- stronger security and preserved verifiabiity",
abstract = "Group signatures allow group members to sign on behalf of the group anonymously. They are therefore well suited to storing data in a way that preserves the users{\textquoteright} privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC{\textquoteright}19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of group signatures and blindly transforms signatures originating from the same user into a consistent representation. Their scheme essentially targets a setting where the entity receiving fully unlinkable signatures and the converted ones is the same: only pseudonyms but not full signatures are converted, and the input to the converter is assumed to be well-formed. Thus, the converted outputs are merely linkable pseudonyms but no longer signatures.In this work we extend and strengthen such convertibly linkable group signatures. Conversion can now be triggered by malicious entities too, and the converted outputs can be publicly verified. This preserves the authentication of data during the conversion process. We define the security of this scheme and give a provably secure instantiation. Our scheme makes use of controlled-malleable NIZKs, which allow proofs to be mauled in a controlled manner. This allows signatures to be blinded, while still ensuring they can be verified during conversions.",
author = "Ashley Fraser and Lydia Grams and Anja Lehman",
year = "2021",
month = dec,
day = "8",
doi = "10.1007/978-3-030-92548-2_11",
language = "English",
isbn = "9783030925475",
pages = "200--221",
editor = "Mauro Conti and Marc Stevens and Stephan Krenn",
booktitle = "Cryptology and Network Security (CANS 2021)",
publisher = "Springer",

}

RIS

TY - GEN

T1 - Selectively linkable group signatures- stronger security and preserved verifiabiity

AU - Fraser, Ashley

AU - Grams, Lydia

AU - Lehman, Anja

PY - 2021/12/8

Y1 - 2021/12/8

N2 - Group signatures allow group members to sign on behalf of the group anonymously. They are therefore well suited to storing data in a way that preserves the users’ privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC’19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of group signatures and blindly transforms signatures originating from the same user into a consistent representation. Their scheme essentially targets a setting where the entity receiving fully unlinkable signatures and the converted ones is the same: only pseudonyms but not full signatures are converted, and the input to the converter is assumed to be well-formed. Thus, the converted outputs are merely linkable pseudonyms but no longer signatures.In this work we extend and strengthen such convertibly linkable group signatures. Conversion can now be triggered by malicious entities too, and the converted outputs can be publicly verified. This preserves the authentication of data during the conversion process. We define the security of this scheme and give a provably secure instantiation. Our scheme makes use of controlled-malleable NIZKs, which allow proofs to be mauled in a controlled manner. This allows signatures to be blinded, while still ensuring they can be verified during conversions.

AB - Group signatures allow group members to sign on behalf of the group anonymously. They are therefore well suited to storing data in a way that preserves the users’ privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC’19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of group signatures and blindly transforms signatures originating from the same user into a consistent representation. Their scheme essentially targets a setting where the entity receiving fully unlinkable signatures and the converted ones is the same: only pseudonyms but not full signatures are converted, and the input to the converter is assumed to be well-formed. Thus, the converted outputs are merely linkable pseudonyms but no longer signatures.In this work we extend and strengthen such convertibly linkable group signatures. Conversion can now be triggered by malicious entities too, and the converted outputs can be publicly verified. This preserves the authentication of data during the conversion process. We define the security of this scheme and give a provably secure instantiation. Our scheme makes use of controlled-malleable NIZKs, which allow proofs to be mauled in a controlled manner. This allows signatures to be blinded, while still ensuring they can be verified during conversions.

U2 - 10.1007/978-3-030-92548-2_11

DO - 10.1007/978-3-030-92548-2_11

M3 - Conference contribution/Paper

SN - 9783030925475

SP - 200

EP - 221

BT - Cryptology and Network Security (CANS 2021)

A2 - Conti, Mauro

A2 - Stevens, Marc

A2 - Krenn, Stephan

PB - Springer

CY - Cham

ER -