User menu

Group Signatures are Suitable for Constrained Devices

Bibliographic reference Canard, Sébastien ; Coisel, Iwen ; de Meulenaer, Giacomo ; Pereira, Olivier. Group Signatures are Suitable for Constrained Devices.ICISC 2010 (Seoul, Korea, du 01/12/2010 au 03/12/2010). In: Information Security and Cryptology - ICISC 2010, 2011, p. 133-150
Permanent URL
  1. Ateniese Giuseppe, Camenisch Jan, Joye Marc, Tsudik Gene, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Advances in Cryptology — CRYPTO 2000 (2000) ISBN:9783540679073 p.255-270, 10.1007/3-540-44598-6_16
  2. Bellare Mihir, Shi Haixia, Zhang Chong, Foundations of Group Signatures: The Case of Dynamic Groups, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.136-153, 10.1007/978-3-540-30574-3_11
  3. Boneh Dan, Boyen Xavier, Shacham Hovav, Short Group Signatures, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.41-55, 10.1007/978-3-540-28628-8_3
  4. Boneh Dan, Boyen Xavier, Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups, 10.1007/s00145-007-9005-7
  5. Boyen Xavier, Waters Brent, Full-Domain Subgroup Hiding and Constant-Size Group Signatures, Public Key Cryptography – PKC 2007 ISBN:9783540716761 p.1-15, 10.1007/978-3-540-71677-8_1
  6. Brickell Ernie, Camenisch Jan, Chen Liqun, Direct anonymous attestation, 10.1145/1030083.1030103
  7. Camenisch Jan, Groth Jens, Group Signatures: Better Efficiency and New Theoretical Aspects, Security in Communication Networks (2005) ISBN:9783540243014 p.120-133, 10.1007/978-3-540-30598-9_9
  8. Canard, S., Girault, M.: Implementing group signature schemes with smart cards. In: CARDIS 2002, pp. 1–10. USENIX (2002)
  9. Chaum David, van Heyst Eugène, Group Signatures, Advances in Cryptology — EUROCRYPT ’91 (1991) ISBN:9783540546207 p.257-265, 10.1007/3-540-46416-6_22
  10. Chaum David, Pedersen Torben Pryds, Wallet Databases with Observers, Advances in Cryptology — CRYPTO’ 92 ISBN:9783540573401 p.89-105, 10.1007/3-540-48071-4_7
  11. Cramer R. J. F., Pedersen T. P., Improved Privacy in Wallets with Observers, Advances in Cryptology — EUROCRYPT ’93 ISBN:9783540576006 p.329-343, 10.1007/3-540-48285-7_29
  12. CrossBow. MICAz low-power wireless sensor module (April 2010),
  13. CrossBow. TelosB low-power wireless sensor module (April 2010),
  14. Delerablée Cécile, Pointcheval David, Dynamic Fully Anonymous Short Group Signatures, Progress in Cryptology - VIETCRYPT 2006 (2006) ISBN:9783540687993 p.193-210, 10.1007/11958239_13
  15. Feldhofer Martin, Dominikus Sandra, Wolkerstorfer Johannes, Strong Authentication for RFID Systems Using the AES Algorithm, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.357-370, 10.1007/978-3-540-28632-5_26
  16. Fiat Amos, Shamir Adi, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology — CRYPTO’ 86 ISBN:9783540180470 p.186-194, 10.1007/3-540-47721-7_12
  17. Furukawa Jun, Imai Hideki, An Efficient Group Signature Scheme from Bilinear Maps, Information Security and Privacy (2005) ISBN:9783540265474 p.455-467, 10.1007/11506157_38
  18. Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, 10.1109/tit.1985.1057074
  19. Girault Marc, Lefranc David, Public Key Authentication with One (Online) Single Addition, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.413-427, 10.1007/978-3-540-28632-5_30
  20. Girault, M., Juniot, L., Robshaw, M.: The Feasibility of On-the-Tag Public Key Cryptography. In: Workshop on RFID Security – RFIDSec 2007, Malaga, Spain (July 2007)
  21. GMP. The GNU Multiple Precision Arithmetic Library (April 2010),
  22. Groth Jens, Fully Anonymous Group Signatures Without Random Oracles, Advances in Cryptology – ASIACRYPT 2007 ISBN:9783540768999 p.164-180, 10.1007/978-3-540-76900-2_10
  23. Lederer Christian, Mader Roland, Koschuch Manuel, Großschädl Johann, Szekely Alexander, Tillich Stefan, Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks (2009) ISBN:9783642039430 p.112-127, 10.1007/978-3-642-03944-7_9
  24. Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245–256 (April 2008)
  25. Lynn, B.: On the implementation of pairing-based cryptosystems. PhD thesis. Stanford University (2007)
  26. Lynn, B.: PBC, the Pairing-Based Cryptography Library (April 2010),
  27. Maitland Greg, Boyd Colin, Co-operatively Formed Group Signatures, Topics in Cryptology — CT-RSA 2002 (2002) ISBN:9783540432241 p.218-235, 10.1007/3-540-45760-7_15
  28. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for fr-reduction (2001)
  29. Naccache David, M'RaÏhi David, Vaudenay Serge, Raphaeli Dan, Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard —, Advances in Cryptology — EUROCRYPT'94 (1995) ISBN:9783540601760 p.77-85, 10.1007/bfb0053426
  30. Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC, pp. 33–43. ACM, New York (1989)
  31. Oliveira Leonardo B., Scott Michael, Lopez Julio, Dahab Ricardo, TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks, 10.1109/inss.2008.4610921
  32. Paillier Pascal, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology — EUROCRYPT ’99 ISBN:9783540658894 p.223-238, 10.1007/3-540-48910-x_16
  33. Schnorr C. P., Efficient Identification and Signatures for Smart Cards, Advances in Cryptology — CRYPTO’ 89 Proceedings ISBN:9780387973173 p.239-252, 10.1007/0-387-34805-0_22
  34. TexasInstruments. Texas Instruments Government Electronic Identification (April 2010),
  35. TinyOS. An open-source operating system designed for wireless embedded sensor networks (April 2010),
  36. Xu, S., Yung, M.: Accountable ring signatures: A smart card approach. In: CARDIS 2004, pp. 271–286. Kluwer, Dordrecht (2004)