Abstract

This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability. Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings. Any group user can produce a signature while hiding his identity in a group. Although group signatures have predefined group settings, ring signatures allow users to form ad-hoc groups. Preserving user identities provided an advantage for group and ring signatures. Thus, presently many applications utilize them. However, standard group signatures enable an authority to freely revoke signers’ anonymity. Thus, the authority might weaken the anonymity of innocent users. On the other hand, traditional ring signatures maintain permanent user anonymity, allowing space for malicious user activities; thus achieving the requirements of privacy-preserved traceability in group signatures and controlled anonymity in ring signatures has become desirable. This paper reviews group and ring signatures and explores the existing approaches that address the identification of malicious user activities. We selected many papers that discuss balancing user tracing and anonymity in group and ring signatures. Since this paper scrutinizes both signatures from their basic idea to obstacles including tracing users, it provides readers a broad synthesis of information about two signature schemes with the knowledge of current approaches to balance excessive traceability in group signatures and extreme anonymity in ring signatures. This paper will also shape the future research directions of two critical signature schemes that require more awareness.

Highlights

  • Introduction iationsThis paper is a survey of two prominent group-oriented digital signatures called group signatures and ring signatures, which support user authentication and anonymity.The purpose of this survey is to point out a challenging problem in both signatures and to present existing approaches

  • We survey two group-oriented signatures, group signatures (GS) and ring signatures (RS), which are dominant in the privacy preservation of users. This survey paper reviews group signature and ring signature schemes including their syntaxes, security definitions, and the development of the two signatures that answer theoretical and practical challenges. Since both signatures have arguable mechanisms for identifying malicious users and preventing their actions, this paper focuses on imbalanced tracing and anonymity features of group signatures and ring signatures

  • Ring signatures are used in systems like e-voting where anonymity is required permanently instead of bidding systems where group signatures are more suitable since identifying users might sometimes be required

Read more

Summary

A Survey on Group Signatures and Ring Signatures

Maharage Nisansala Sevwandi Perera 1, * , Toru Nakamura 2 , Masayuki Hashimoto 1 , Hiroyuki Yokoyama 1 , Chen-Mou Cheng 3 and Kouichi Sakurai 4. Adaptive Communications Research Laboratories, Advanced Telecommunications Research Institute

Related Works
Security Notions
Current Works
Identifying Signers in Group Signatures and Ring Signatures
User Tracing Methods in Group Signatures
Preventing Malicious User Actions in Ring Signatures
Discussion
Comparison of Group Signatures and Ring Signatures
Identifying User-Misbehaviors in Group Signatures and Ring Signatures
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.