Massive Group Message Authentication with Revocable Anonymity

Boaz Catane, Amir Herzberg

Abstract

.

References

  1. Ateniese, G., Camenisch, J., Hohenberger, S., and De Medeiros, B. (2005). Practical group signatures without random oracles. EUROCRYPT06.
  2. Bellare, M., Micciancio, D., and Warinschi, B. (2003). Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT, pages 614- 629.
  3. Bellare, M., Shi, H., and Zhang, C. (2005). Foundations of group signatures: The case of dynamic groups. Topics in Cryptology-CT-RSA 2005, pages 136-153.
  4. Boyen, X. and Waters, B. (2006). Compact group signatures without random oracles. Advances in CryptologyEUROCRYPT 2006, pages 427-444.
  5. Camenisch, J. and Groth, J. (2005). Group signatures: Better efficiency and new theoretical aspects. Security in Communication Networks, pages 120-133.
  6. Canetti, R., Goldreich, O., and Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM (JACM), 51(4):557-594.
  7. Chaum, D. and Van Heyst, E. (1991). Group signatures. In Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, pages 257-265. Springer-Verlag.
  8. Cheng, X., Yang, C., and Yu, J. (2011). A new approach to group signature schemes. Journal of Computers, 6(4):812-817.
  9. Choi, S. G., Park, K., and Yung, M. (2006). Short traceable signatures based on bilinear pairings. In IWSEC, pages 88-103.
  10. Cramer, R. and Shoup, V. (1998). A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in CryptologyCRYPTO'98, pages 13-25. Springer.
  11. Diffie, W. and Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654.
  12. Kiayias, A., Tsiounis, Y., and Yung, M. (2004). Traceable signatures. In Advances in Cryptology-EUROCRYPT 2004, pages 571-589. Springer.
  13. Lamport, L. (1979). Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International.
  14. Przydatek, B. and Wikström, D. (2010). Group message authentication. Security and Cryptography for Networks, pages 399-417.
Download


Paper Citation


in Harvard Style

Catane B. and Herzberg A. (2013). Massive Group Message Authentication with Revocable Anonymity . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 331-338. DOI: 10.5220/0004509203310338


in Bibtex Style

@conference{secrypt13,
author={Boaz Catane and Amir Herzberg},
title={Massive Group Message Authentication with Revocable Anonymity},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={331-338},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004509203310338},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Massive Group Message Authentication with Revocable Anonymity
SN - 978-989-8565-73-0
AU - Catane B.
AU - Herzberg A.
PY - 2013
SP - 331
EP - 338
DO - 10.5220/0004509203310338