Massive Group Message Authentication with Revocable Anonymity
Boaz Catane, Amir Herzberg
2013
Abstract
.
References
- Ateniese, G., Camenisch, J., Hohenberger, S., and De Medeiros, B. (2005). Practical group signatures without random oracles. EUROCRYPT06.
- Bellare, M., Micciancio, D., and Warinschi, B. (2003). Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT, pages 614- 629.
- Bellare, M., Shi, H., and Zhang, C. (2005). Foundations of group signatures: The case of dynamic groups. Topics in Cryptology-CT-RSA 2005, pages 136-153.
- Boyen, X. and Waters, B. (2006). Compact group signatures without random oracles. Advances in CryptologyEUROCRYPT 2006, pages 427-444.
- Camenisch, J. and Groth, J. (2005). Group signatures: Better efficiency and new theoretical aspects. Security in Communication Networks, pages 120-133.
- Canetti, R., Goldreich, O., and Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM (JACM), 51(4):557-594.
- Chaum, D. and Van Heyst, E. (1991). Group signatures. In Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, pages 257-265. Springer-Verlag.
- Cheng, X., Yang, C., and Yu, J. (2011). A new approach to group signature schemes. Journal of Computers, 6(4):812-817.
- Choi, S. G., Park, K., and Yung, M. (2006). Short traceable signatures based on bilinear pairings. In IWSEC, pages 88-103.
- Cramer, R. and Shoup, V. (1998). A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in CryptologyCRYPTO'98, pages 13-25. Springer.
- Diffie, W. and Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654.
- Kiayias, A., Tsiounis, Y., and Yung, M. (2004). Traceable signatures. In Advances in Cryptology-EUROCRYPT 2004, pages 571-589. Springer.
- Lamport, L. (1979). Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International.
- Przydatek, B. and Wikström, D. (2010). Group message authentication. Security and Cryptography for Networks, pages 399-417.
Paper Citation
in Harvard Style
Catane B. and Herzberg A. (2013). Massive Group Message Authentication with Revocable Anonymity . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 331-338. DOI: 10.5220/0004509203310338
in Bibtex Style
@conference{secrypt13,
author={Boaz Catane and Amir Herzberg},
title={Massive Group Message Authentication with Revocable Anonymity},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={331-338},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004509203310338},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Massive Group Message Authentication with Revocable Anonymity
SN - 978-989-8565-73-0
AU - Catane B.
AU - Herzberg A.
PY - 2013
SP - 331
EP - 338
DO - 10.5220/0004509203310338