Experimental browser for the Atmosphere
DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\rm{SPHINCS}^+$ (Mojtaba Fadavi, Seyyed Arash Azimi, Sabyasachi Karati, Samuel Jaques) ia.cr/2025/760
May 3, 2025, 8:13 PM
{ "uri": "at://did:plc:fwa55bujvdrwlwlwgqmmxmuf/app.bsky.feed.post/3loc5o3wajr2p", "cid": "bafyreid773dfx7wepuqqm7cfpeotgcxsczyd4oyt3cg6ev3neczm5fb3ii", "value": { "text": "DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\\rm{SPHINCS}^+$ (Mojtaba Fadavi, Seyyed Arash Azimi, Sabyasachi Karati, Samuel Jaques) ia.cr/2025/760", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.images", "images": [ { "alt": "Abstract. A group signature scheme enables users of a group to anonymously sign messages on behalf of the group, while a designated authority can revoke anonymity when needed to ensure user accountability. Among group signature schemes, fully dynamic ones are particularly desirable as they allow new users to join and misbehaved existing users to be revoked without requiring system-wide updates. This paper introduces DGSP, a post-quantum fully dynamic group signature scheme that addresses key limitations of existing schemes like DGMT and SPHINX-in-the-Head (SITH). Leveraging the properties of ${\\rm SPHINCS}^+$, DGSP achieves a superior balance between scalability and efficiency by (i) supporting up to 2⁶⁰ users, (ii) requiring negligible setup time, and (iii) featuring efficient algorithms with short signatures of constant-size. Notably, while DGMT is limited to 2¹⁵ users, DGSP extends this to 2⁶⁰ while keeping signatures compact—only 3.03 to 4.93 times larger than those of DGMT, yet just 0.021 to 0.004 times the size of SITH signatures. This makes DGSP a compelling solution for applications requiring both large-scale user support and signature efficiency in the post-quantum setting. Moreover, DGSP strengthens managerial accountability compared to DGMT by (i) enabling users to verify their certificates generated by the manager and (ii) ensuring public verifiability of the manager’s signature attribution. Although SITH claims to support 2⁶⁰ users, our analysis reveals that its opening algorithm is highly inefficient, making it impractical to handle such a large number of users. Our security analysis shows that DGSP achieves unforgeability, anonymity, and traceability in the standard model. We also provide a complete implementation of DGSP. Our experimental study exhibits that DGSP is superior over existing schemes in terms of efficiency and scalability.\n", "image": { "$type": "blob", "ref": { "$link": "bafkreifuv6e64ltuscq6ooq2unxkidw6fkmacmaljruuk3fhgaalw4a5su" }, "mimeType": "image/png", "size": 108613 }, "aspectRatio": { "width": 1200, "height": 800 } }, { "alt": "Image showing part 2 of abstract.", "image": { "$type": "blob", "ref": { "$link": "bafkreic7bxpmlq4ujxn3d6lys7tyxwd5iye7iavezzqlctd43evtzspnhq" }, "mimeType": "image/png", "size": 78038 }, "aspectRatio": { "width": 1200, "height": 800 } } ] }, "facets": [ { "index": { "byteEnd": 157, "byteStart": 144 }, "features": [ { "did": "did:plc:4eydqdyridwmfgonkup7hgun", "$type": "app.bsky.richtext.facet#mention" } ] }, { "index": { "byteEnd": 173, "byteStart": 159 }, "features": [ { "uri": "https://ia.cr/2025/760", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-05-03T20:13:50.166691Z" } }