期刊文献+

有效的适合大群体群签名

Efficient Group Signature Scheme for Large Group
下载PDF
导出
摘要 该文将构造一种新的群签名体制,它将克服群公钥的长度和群成员数成线性的问题,并且在增加新成员时不用进行公钥的修改。实现的方法是基于DSA的知识签名。 In this paper we propose new group signature schemes which overcomes some problems ,such as the length of the public key is linear in the size of the group etc.Furthermore,the scheme allows the group manager to add new members to the group without modifying the public key.The realization is based on the knowledge of signature of DSA.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第14期22-24,共3页 Computer Engineering and Applications
基金 国家973重点基础研究规划基金项目(编号:G1999035802) 国家863高技术发展计划基金资助项目(编号:2001AA141120)
关键词 群签名 知识签名 有效性 group signature,knowledge of signature,efficiency
  • 相关文献

参考文献10

  • 1D Chaum,E van Heyst. Group signatures[C].In:Advances in Cryptology-EUROCRYPT′91 ,volume 547 of Lecture Notes in Computer Science, Springer-Verlag, 1991: 257~265
  • 2L Chen,T P Pederson. New group signature schemes[C].In:Advances in Cryptology-EUROCRYPT′94,volume 950 of Lecture Notes in Computer Science ,Springer-Verlag, 1995:171~181
  • 3J Camenisch.Efficient and generalized group signatures[C].In:Advances in Cryptology-EUROCRYP′97,VOLUME 1233 OF lecture Notes in Computer Science ,Springer Verlag, 1997:465~479
  • 4J Camenisch. Efficient group signature schemes for large groups[C].In:Advances in Cryptology-CRYPTO′97 ,volume 1294 of Lecture Notes in Computer Sciences,Springer Verlag, 1997:410~424
  • 5G Brassard,D Chaum,C Crepeau.Minimum disclosure proofs of knowledge[J]Journal of Computer and System Sciences, 1988;37(2): 156~189
  • 6J Boyar,R Peralta. Short discreet proofs[C].In:Advances inCryptologyEUROCRYPT′96,volume 1070 of Lecture Notes in Computer Science,Springer Verlag, 1996:131~142
  • 7U Feige,A Fiat,A Shamir. Zero-knowledge proofs of identity[J].Journal of Crypto-logy, 1988; 1:77~94
  • 8National Institute of Standards and Technology,NIST FIPS PUB 186[S].Digital Signature Standard,U S Department of Commerce,1994-05
  • 9M Bellare,P Rogaway.Random oracles are practical:A paradigm for designing efficient protocols[C].In:First ACM Conference on Computer and Communication Security,Association for Computing Machinery,1993:62~73
  • 10R Rivest,A Shmir,L Adleman. A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978;21 (2): 120~126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部