Using group signatures for identity management and its implementation

Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Abstract

We discuss the merits of using group signature technology in Identity Management. We propose a novel model of group signature scheme and introduce a new entity called User-Revocation manager. User-Revocation manager plays an independent role regarding user revocation which was previously covered by either Group manager or Issuing manager. We extend the idea of the Camenisch-Groth scheme and present an efficient revocation scheme where the cost of user revocation is smaller than that of the Camenisch-Groth scheme. We also discuss the details of our implementation.

Original languageEnglish
Title of host publicationProceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
Pages73-78
Number of pages6
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event2d ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06 - Alexandria, VA, United States
Duration: 2006 Nov 32006 Nov 3

Publication series

NameProceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06

Conference

Conference2d ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
CountryUnited States
CityAlexandria, VA
Period06/11/306/11/3

Keywords

  • Group signature
  • Identity management
  • Implementation
  • User revocation

ASJC Scopus subject areas

  • Computer Vision and Pattern Recognition
  • Signal Processing
  • Software

Fingerprint Dive into the research topics of 'Using group signatures for identity management and its implementation'. Together they form a unique fingerprint.

  • Cite this

    Isshiki, T., Mori, K., Sako, K., Teranishi, I., & Yonezawa, S. (2006). Using group signatures for identity management and its implementation. In Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06 (pp. 73-78). (Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06). https://doi.org/10.1145/1179529.1179541