Detail publikace

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration

MALINA, L. HAJNÝ, J. MARTINÁSEK, Z.

Originální název

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration

Anglický název

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration

Jazyk

en

Originální abstrakt

This paper presents a novel proposal of group signatures with verifier-local revocation employing a natural expiration to ensure an efficient verification of signatures and a revocation check. Our proposed group signature scheme offers the more efficient verification phase which employs the revocation list that is reduced in time by a natural expiration of group member secret keys. Due to an optimization in the verification phase, our scheme is more efficient than related solutions.

Anglický abstrakt

This paper presents a novel proposal of group signatures with verifier-local revocation employing a natural expiration to ensure an efficient verification of signatures and a revocation check. Our proposed group signature scheme offers the more efficient verification phase which employs the revocation list that is reduced in time by a natural expiration of group member secret keys. Due to an optimization in the verification phase, our scheme is more efficient than related solutions.

Dokumenty

BibTex


@inproceedings{BUT100899,
  author="Lukáš {Malina} and Jan {Hajný} and Zdeněk {Martinásek}",
  title="Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration",
  annote="This paper presents a novel proposal of group signatures with verifier-local revocation employing a natural
expiration to ensure an efficient verification of signatures and a revocation check. Our proposed group signature scheme offers the more efficient verification phase which
employs the revocation list that is reduced in time by a natural expiration of group member secret keys. Due
to an optimization in the verification phase, our scheme is more efficient than related solutions.",
  booktitle="Proceedings of the 10th International Conference on Security and Cryptography",
  chapter="100899",
  howpublished="online",
  year="2013",
  month="july",
  pages="555--560",
  type="conference paper"
}