Check out the new USENIX Web site.
Next: First Approach Up: Implementing Group Signature Schemes Previous: Security Arguments

Revocation in Group Signature Schemes

We suggest two approaches for dealing with member revocation. The first one is based on a group-shared private key and, as in section 3, relies on the confidentiality of this key (even w.r.t. the card-holder). The second one is based on ``black lists'' and relies on the integrity of the ``black list'' membership program executed by the card.



Subsections