期刊文献+

ACJT群签名方案中一种新的成员撤销方案

New Membership Revocation Scheme in ACJT Group Signature
下载PDF
导出
摘要 在ACJT群签名方案的基础上,提出一个新的成员撤销方案。新方案中群公钥的大小仅取决于群中成员的个数,不会随着撤销成员的增加而无限增大。增加或撤销一个成员,群管理者只需作乘法或除法运算来更新群公钥,签名和验证过程更简单,而且证明了新方案的安全性。 A new membership revocation method based on the ACJT group scheme was provided. In this new scheme, the size of public key only lay on the number of members in the group, and would not increase infinitely along with the increase of number of members which were revoked. It needed only a multiplication or division to update the public key for the group manager to add or exclude a group member. The signing and verifying procedure were simpler than previous ones. The security of the new scheme was proved.
出处 《计算机应用研究》 CSCD 北大核心 2007年第4期127-129,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10571052)
关键词 群签名 撤销 ACJT方案 group signature revocation ACJT scheme
  • 相关文献

参考文献11

  • 1CHAUM D, HEYST E. Group signature: proc. of EUROP'91 [ C].Heidelberg: Springer-Verlag, 1992:257-265.
  • 2CAMENISCH J, STADLER M. Efficient group signature schemes for large groups: Advances in Cryptology-CRYPTO, LNCS 1296 [ C].Heidelbery- Springer-Verlag, 1997:410-424.
  • 3BRESSON E, STERN J. Efficient revocation in group signature:proc. of the PKC'01, LNCS 1992[ C]. Heidelberg: Springer-Verlag,2001 : 190-206.
  • 4ATENIESE G, CAMENISCH J, JOYE M, et al. A practical and provably secure coalition-resistant group signature scheme: Advances in Cryptology-CRYPTO, LNCS 1880[ C]. Heidelberg: Springer-Vetlag, 2000:255-270.
  • 5SONG D. Practical forward secure group signature schemes: proc. of the 8th ACM Conf. on Computer and Communication Security, ACM[C]. [S.I. ] :[s.n. ], 2001:225-234.
  • 6ATENIESE G, SONG D, TSUDIK G. Quasi-efficient revocation of group signature[EB/OL]. http://eprint. iacr. org.
  • 7KIM H J, LIM J I, LEE D H. Efficient and secure member deletion in group signature schemes[ C]//Won D. Proc. of the ICISC 2000,LNCS 2015. Heidelberg: Springer-Verlag, 2001:150-161.
  • 8CAMENISCH J, LYSYANSKAYA A. Dynamic accumulators and application to efficient revocation of anonymous credentials: advances in Cryptology-CRYPTO, LNCS 2442 [ C ]. Heidelberg : Springer-Verlag,2002:61-77.
  • 9CAMENISCH J,LYSYANSKAYA A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation: advances in Cryptology-EUROCRYPT. LNCS 2045 [ C ]. Heidelbery : Springer-Verlag, 2001:93-118.
  • 10陈泽文,王继林,黄继武,王育民,黄达人.ACJT群签名方案中成员撤消的高效实现[J].软件学报,2005,16(1):151-157. 被引量:17

二级参考文献19

  • 1Camenisch J, Michels M. A group signature scheme based on an RSA-variant. Technical Report, RS-98-27, BRICS, University of Aarhus, 1999.
  • 2Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash. In: Financial Cryptography(FC'98). LNCS 1465, Heidelberg: Springer-Verlag, 1998.184-197.
  • 3Camenish J, Stadler M. Efficient group signatures for large groups. In: Proc of the CRYPTO'97. LNCS 1296, Heidelberg:Springer-Verlag, 1997.410-424.
  • 4Song D. Practical forward secure group signature schemes. In: Proc of the 8th ACM Conf. on Computer and Communication Security (CCS 2001). ACM, 2001. 225-234.
  • 5Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme. In:Advances in Cryptulogy- CRYPTO 2000. LNCS 1880, Heidelberg: Springer-Verlag, 2000. 255-270.
  • 6Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash. In: Financial Cryptography (FC'98). LNCS 1465, Heidelberg: Springer-Verlag, 1998.184-197.
  • 7Nakanishi T, Fujiwara T, Watanabe H. A linkable group signature and its application to a fair secret voting. Trans IPS Japan, 1999,40(7):3085-3096.
  • 8Bresson E, Stern J. Efficient revocation in group signature. In: Proc of the PKC'01. LNCS 1992, Heidelberg: Springer-Verlag,2001. 190-206.
  • 9Camenish J, Stadler M. Efficient group signatures for large groups. In: Proc. of the CRYPTO'97. LNCS 1296, Heidelberg: Springer-Verlag, 1997.410-424.
  • 10Song D. Practical forward secure group signature schemes. In: Proc. of the 8th ACM Conf. on Computer and Communication Security (CCS 2001). ACM, 2001. 225-234.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部