from his signing key is added to RL. It is used by ver-
ifiers to prevent revoked users from further signing.
To reach our goal of Cross-Unlinkability, we use
the group signature introduced in (Bringer and Patey,
2012) (which patches and extends (Chen and Li,
2010)) that satisfies Backward Unlinkability. This
property enables users to sign at different time peri-
ods using the same keys, while maintaining unlinka-
bility between signatures issued at different periods,
even if the user is revoked at one of these periods. In
our proposal, we no more consider these periods as
time periods but as children of a given identity in the
identity domain tree. Thus, authentications in two dif-
ferent domains are impossible to link if the user is not
revoked from both. Moreover, the cascade revocation
process that we describe does not threaten the security
properties that we guarantee.
2 THE CL AND BP GROUP
SIGNATURES
In this section, we describe the model of group sig-
natures presented in (Bringer and Patey, 2012). We
instantiate this model using two schemes introduced
in (Bringer and Patey, 2012): a patched version of the
(Chen and Li, 2010) scheme, denoted by CL, and an
extension of this patched version with Backward Un-
linkability (BU), denoted by BP. Notice that both can
be used with the same parameters.
2.1 Components
There are three types of entities: a Group Manager
GM, a set of members and a set of verifiers. A BP
or a CL Group Signature Scheme consists of the fol-
lowing algorithms. (Moreover, in the BP scheme, be-
cause of BU, all algorithms but KeyGen depend on
the current time period j and one revocation list RL
j
per time period has to be used (see also Remark 1)).
KeyGen. The group manager outputs the group pub-
lic parameters gpk. He also chooses a secret key msk
and its public counterpart mpk. gpk and mpk are pub-
lished. GM also publishes an empty revocation list
RL.
Join. This algorithm is an interactive protocol be-
tween GM and a member M
i
. M
i
gets a secret key
sk
i
= (x
i
, A
i
, f
i
) where f
i
is chosen by M
i
, x
i
by GM
and A
i
is computed by GM using msk, x
i
and some
information about f
i
. GM only gets x
i
and A
i
, he also
derives a revocation token rt
i
from x
i
.
Revoke. GM runs this algorithm to prevent a member
M
i
from further making valid signatures. It outputs an
updated revocation list RL.
Sign. This algorithm, run by a member M
i
, takes as
input a message m, M
i
’s key sk
i
and a message m. It
outputs a signature σ.
Verify. This algorithm, run by a verifier takes as input
a message m, its signature σ and the Revocation List
RL. It checks if the message has been signed by an un-
revoked group member, without revealing the signer’s
identity. The possible outputs are valid and invalid.
Open. This algorithm is run by GM. It takes a sig-
nature σ on a message m as input, together with all
revocation tokens of the group members. It reveals
the identity of the signer.
2.2 Security Properties
We describe the security properties fulfilled by the
group signature schemes. Both BP and CL schemes
satisfy Correctness, Selfless-Anonymity, Traceability
and Exculpability. The BP scheme moreover satisfies
Backward Unlinkability.
(a) Correctness. Every check of a well-formed sig-
nature, made by an unrevoked user, returns valid.
(b) Selfless-Anonymity. A member can say if he pro-
duced a particular signature. If it was not him, he has
no information about the user who produced it.
(c) Traceability. No attacker (or group of attackers)
is able to forge a signature that can not be traced to
one of the corrupted users which participated in its
forgery.
(d) Exculpability. Nobody, even the Group Manager,
is able to produce another user’s signature.
(e) Backward Unlinkabilty. (encompasses Selfless-
Anonymity) The valid signatures remain anonymous,
even after the signer’s revocation. Revoked users can
come back after their revocation into the group and
use their previous keys without any loss of anonymity.
Remark 1. (Backward Unlinkability) To enable BU,
the BP scheme divides time into periods. Instead of a
unique revocation list RL, there is one revocation list
RL
j
for each period j. Similarly, each member M
i
has
a revocation token rt
ij
for each period j instead of a
unique rt
i
. Usually, for every time period j, a random
token h
j
is chosen. The period revocation token is
then obtained as follows: rt
ij
= h
rt
i
j
. Thus, two tokens
rt
ij
and rt
ij
′
of the same user at different time periods
are unlinkable, which guarantees BU.
Remark 2 (BCPZ Anonymous Authentication). We
describe in Figure 2 how to adapt the BCPZ anony-
mous authentication scheme using the CL scheme. We
refer the reader to (Bringer et al., 2008) for further
details. Notice that in our adaptation, we use the
SECRYPT2012-InternationalConferenceonSecurityandCryptography
422