18. Privacy Protection with Group Signatures

  1. Luca Delgrossi1 and
  2. Tao Zhang2

Published Online: 13 SEP 2012

DOI: 10.1002/9781118452189.ch18

Vehicle Safety Communications: Protocols, Security, and Privacy

Vehicle Safety Communications: Protocols, Security, and Privacy

How to Cite

Delgrossi, L. and Zhang, T. (2012) Privacy Protection with Group Signatures, in Vehicle Safety Communications: Protocols, Security, and Privacy, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781118452189.ch18

Author Information

  1. 1

    Mercedes-Benz R&D North America, Inc., USA

  2. 2

    Cisco Systems, Inc., USA

Publication History

  1. Published Online: 13 SEP 2012
  2. Published Print: 5 OCT 2012

Book Series:

  1. Wiley Series on Information and Communication Technology

Book Series Editors:

  1. T. Russell Hsing and
  2. Vincent K. N. Lau

ISBN Information

Print ISBN: 9781118132722

Online ISBN: 9781118452189

SEARCH

Keywords:

  • ACJT group signature scheme;
  • CG group signature scheme;
  • group signature schemes;
  • short group signatures scheme;
  • verifier-local revocation (VLR) schemes

Summary

This chapter describes an overview of group signature schemes, and discusses the properties that impact their suitability for large and dynamic consumer vehicle networks. Most state-of-the-art group signature schemes rely on zero-knowledge proof of knowledge mechanisms. The chapter summarizes the ACJT group signature scheme at a high level. It also discusses the representative extensions to the ACJT scheme to support membership revocation. The Jan Camenishch and Jens Groth (CG) group signature scheme builds upon the ACJT group signature scheme and the group signature scheme with extensions to support dynamic addition and revocation of membership. The Short Group Signatures scheme relies on zero-knowledge proofs of knowledge. It is based on the Strong Diffie-Hellman Assumption rather than the Strong RSA Assumption used in the ACJT scheme. Verifier-Local Revocation (VLR) schemes for group membership revocation needs to distribute revocation list (RLs) to signature verifiers rather than both signers and verifiers.

Controlled Vocabulary Terms

group theoretical schemes; public key cryptography