Our approach consists in generating an additional signature
computed with a group-shared private key . We denote by
the associated public key. is communicated by
the group manager to each non revoked member, by the means of a
group key distribution scheme (for example [16]). As a
consequence, the revocation problem is reduced to a group key
distribution problem, for which solutions already exist. Moreover,
it happens that, in our case, these solutions are easier to use.
When a new member wants to integrate the group, the group manager
securely sends him, among other elements, the group-shared key
. And when a member is revoked, the group manager sets up
a mechanism of member revocation, which implies the renewal of the
group-shared key. It is impossible for the revoked member to learn
anything about the new shared key and consequently he cannot sign
anymore. The group manager has to publish data in order to make
possible for other members to get the new key.
After that, if a member wants to sign a message on behalf of
the group (see Figure 2), he computes his group signature
as usual (using [1], [6] or the solution
described in section 3 for example) to obtain a couple
which he is going to sign by means of . The receiver can
then verify the latter signature with and the value
as a signature of a group member.
Figure 2:
First Approach - Signature Protocol
= Message
= Concatenation of and
= Group (private/secret) key(s)
= Group-shared signature private key
= Group signature algorithm
= Signature algorithm
= M's group signature
= Signature of the message
= Concatenation algorithm