Massive group message authentication with revocable anonymity

Boaz Catane, Amir Herzberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present and implement schemes for authenticating messages from a group of users to a recipient, with revocable anonymity and massive (very high) message rate. Our implementations present a trade-off between the efficiency and the security required: from online group managers that participate in every message sent to offline managers, from assuming a trusted group manager and a trusted recipient to securing against both entities. All implementations have the traceablity feature, allowing distributive and efficient tracing of all messages originating from a specific group member without violating anonymity of other members. In addition, our schemes are efficient and practical.

Original languageEnglish
Title of host publicationICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
Pages331-338
Number of pages8
StatePublished - 2013
Event10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013 - Reykjavik, Iceland
Duration: 29 Jul 201331 Jul 2013

Publication series

NameICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings

Conference

Conference10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013
Country/TerritoryIceland
CityReykjavik
Period29/07/1331/07/13

Keywords

  • Digital signatures
  • Efficient implementations
  • Group signatures
  • Revocation

Fingerprint

Dive into the research topics of 'Massive group message authentication with revocable anonymity'. Together they form a unique fingerprint.

Cite this