File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Event-oriented k-times revocable-iff-linked group signatures

TitleEvent-oriented k-times revocable-iff-linked group signatures
Authors
KeywordsEvent-oriented
Group signature
K-TAA
Revocable anonymity
Artificial intelligence
Issue Date2006
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 11th Australian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, 3-5 July 2006. In Lecture Notes in Computer Science, 2006, v. 4058, p. 223-234 How to Cite?
AbstractIn this paper, we introduce the notion of event-oriented k-times revocable if and only if linked group signatures (k-EoRiffL group signatures). In k-EoRiffL group signatures, signers can sign on behalf of a group anonymously und unlinkably up to a permitted number of times (k) per event. No party, even the group manager, can revoke the anonymity of the signer. On the other hand, everyone can identify the signer if he signs more than k times for a particular event. We then show that k-EoRiffL group signatures can be used for k-times anonymous authentication(k-TAA), compact e- cash, e-voting, etc. We formally define security model for the new notion and propose constant-size construction, that is, size of our construction is independent of the size of the group and the number of permitted usage k. Our construction is secure based on the q-strong Diffie-Hellman assumption and the y-DDHI assumption. © Springer-Vorlag Berlin Heidelberg 2006.
DescriptionLNCS v. 4058 is Proceedings of the 11th Australasian Conference, ACISP 2006
Persistent Identifierhttp://hdl.handle.net/10722/93080
ISSN
2020 SCImago Journal Rankings: 0.249

 

DC FieldValueLanguage
dc.contributor.authorAu, MHen_HK
dc.contributor.authorSusilo, Wen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-09-25T14:50:17Z-
dc.date.available2010-09-25T14:50:17Z-
dc.date.issued2006en_HK
dc.identifier.citationThe 11th Australian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, 3-5 July 2006. In Lecture Notes in Computer Science, 2006, v. 4058, p. 223-234en_HK
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/93080-
dc.descriptionLNCS v. 4058 is Proceedings of the 11th Australasian Conference, ACISP 2006-
dc.description.abstractIn this paper, we introduce the notion of event-oriented k-times revocable if and only if linked group signatures (k-EoRiffL group signatures). In k-EoRiffL group signatures, signers can sign on behalf of a group anonymously und unlinkably up to a permitted number of times (k) per event. No party, even the group manager, can revoke the anonymity of the signer. On the other hand, everyone can identify the signer if he signs more than k times for a particular event. We then show that k-EoRiffL group signatures can be used for k-times anonymous authentication(k-TAA), compact e- cash, e-voting, etc. We formally define security model for the new notion and propose constant-size construction, that is, size of our construction is independent of the size of the group and the number of permitted usage k. Our construction is secure based on the q-strong Diffie-Hellman assumption and the y-DDHI assumption. © Springer-Vorlag Berlin Heidelberg 2006.-
dc.languageengen_HK
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/-
dc.relation.ispartofLecture Notes in Computer Scienceen_HK
dc.rightsThe original publication is available at www.springerlink.com-
dc.subjectEvent-oriented-
dc.subjectGroup signature-
dc.subjectK-TAA-
dc.subjectRevocable anonymity-
dc.subjectArtificial intelligence-
dc.titleEvent-oriented k-times revocable-iff-linked group signaturesen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailAu, MH: mhaa456@uow.edu.auen_HK
dc.identifier.emailSusilo, W: wsusilo@uow.edu.au-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/11780656_19-
dc.identifier.scopuseid_2-s2.0-33746354988-
dc.identifier.hkuros161386en_HK
dc.identifier.volume4058-
dc.identifier.spage223en_HK
dc.identifier.epage234en_HK
dc.description.otherThe 11th Australian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, 3-5 July 2006. In Lecture Notes in Computer Science, 2006, v. 4058, p. 223-234-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats