期刊文献+

一种群签名方案的分析及改进 被引量:2

Analysis and Improvement of a Group Signature Scheme
下载PDF
导出
摘要 提出一种改进的基于中国剩余定理的群签名方案:有人申请加入群时,加强申请人与群中心传递参数的验证,确保信息没有被篡改,无法冒充成员加入群;群成员的签名中不含有该人信息,保证成员签名之间无关联性;群成员撤销时,对成员公钥修改进行限制,确保撤销成员无法继续签名.解决了Wang方案群成员私钥泄露、签名关联性、被撤销成员伪造签名和非法成员加入等问题.分析表明,所提方案对群中心与群成员之间传递的信息严格验证,能够满足群签名方案的安全需求. Based on Chinese remainder theorem, an improved signature scheme is proposed to strictly verify the validity of the parameters transferring between the applicant and group center when a person is applying for joining the group, prevent the information from interpolation and ensure that no impostor can join the group. Then the information on a candidate even impostor is impossible to be included in the signatures, thus providing the irrelevance among all signatures. When deleting a group member, the scheme will restrict the modifications to be made to the public key of the member so as to ensure that no way will the member sign. The proposed scheme solves the problem as shown in Wang' s scheme, such as divulging private key, signature relevance, forgery attack of revoked member and invalid join. Analyzed results showed that the proposed scheme can meet the security for the group signature.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第2期189-192,213,共5页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60673159 70671020 60802023) 国家高技术研究发展计划重点项目(2007AA041201) 教育部科学技术研究重点资助项目(108040) 教育部高等学校博士学科点专项科研基金资助项目(20060145012 20070145017 20070145096)
关键词 群签名 中国剩余定理 群中心 数字签名 安全性 group signature Chinese remainder theorem group center digital signature security
  • 相关文献

参考文献11

  • 1Chaum D, Van Heyst E. Group signatures[C]//Proceedings of Eurocrypt. Berlin: Springer Verlag, 1991:257 - 265.
  • 2Nakanishi T, Funabiki N. Group signature schemes with membership revocation for large groups [ J ]. IEICE Transactions on Fundamentals of Electronics, Comnzunications and Computer Sciences, 2006, 89 (5) : 1275 - 1283.
  • 3He G, Tare S R. A group signature scheme with signature claiming and variable linkability [ C] // 25th IEEE International Performance, Computing, and Communications Conference. Washington D C: IEEE Computer Society, 2006: 497 - 504.
  • 4Zhang J H, Geng Q. On the security of group signature scheme and designated verifier signature scheme [ C ] // Proceedings of the 2008 IEEE International Conference on Networking, Architecture, and Storage. Washington D C: IEEE Computer Society, 2008:351-358.
  • 5李俊,崔国华,刘志远.一个群签名方案的密码学分析与改进[J].电子学报,2007,35(4):778-781. 被引量:16
  • 6Zhou S, Lin D. Group signatures with reduced bandwidth [J ]. IEE Prcxeedings : In fornzation .Security, 2006, 153 (4):146- 152.
  • 7Kim K, Lim S, Yie I, et al. Hierarchical identity based group signature with enhanced privacy of the signers[C]// Proceedings of the 7th WSEAS International Conference on Applied Informatics and Conwnunications. Stevens Point: World Scientific and Engineering Academy and Society, 2007 : 29 - 33.
  • 8Nakanishi T, Funabiki N. A short anonymously revocable group signature scheme from decision linear assumption[ C]// Proceedings of the 2008 ACM Symposium Information, Computer and Communications Security. New York: ACM Press, 2008:337 340.
  • 9Contini S, Yin Y. Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions [ C ]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2006: 37-53.
  • 10王凤和,胡予濮,王春晓.一个基于中国剩余定理的群签名方案的攻击及其改进方案[J].电子与信息学报,2007,29(1):182-184. 被引量:15

二级参考文献29

  • 1陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 2Chaum D,Heyst V E.Group signatures[A].Proc of EUROCRYPT'91[C].Lecture Notes in Computer Science,1991,547:257-265.
  • 3Camenish J,Stadler M.Efficient group signatures for large groups[A].Proc.of CRYPTO'97[C].Lecture Notes in Computer Science,1997,1296:410-424.
  • 4Camenish J,Michels M.A group signature scheme with improved efficiency[A].Proc.of ASIACRYPT'98[C].Lecture Notes in Computer Science,1998,1541:160-174.
  • 5Ateniese G,Tsudik G.Some open issues and new directions in group signatures[OL].http://www.isi.edu/-gts/pubs.html.
  • 6Chen L,Pedersen T.New group signature schemes[A].Proc.of EUROCRYPT'94[C].Lecture Notes in Computer Science.1995,950:171-181.
  • 7Camenish J.Efficient and generalized group signatures[A].Proceedings of CRYPTO'93[C].Lecture Notes in Computer Science,1993,1233:302-318.
  • 8Kims J,Parks J,Won D H.Group signatures for hierarchical multigroups[J].Lecture Notes in Computer Science,1998,1163:273-281.
  • 9Hysyansksya A,Ramzan Z.Group blind digital signatures:A scalable solution to electronic cash[A].Pro.of the 2ndFinancial Cryptography Conference[C].Anguilla,BWI,1998.184-197.
  • 10Park S,Kims J,Wond H.A practical identity based group signature[A].Conference on Electronics,Information and Communications (ICEIC'95)[C].China,1995.64-67.

共引文献61

同被引文献31

  • 1张焕国.密码学引论[M].武汉:武汉大学出版社,2004..
  • 2张焕国,王张宜.密码学引论[M].武汉:武汉大学出版社,2009.
  • 3Turban E. 电子商务:管理视角[M]. 严建援,译. 北京: 机械工业出版社,2010.
  • 4Rivest R L. Shamir A,Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Communications of the ACM,1976,21(2):120-126.
  • 5Rivest R L,Shamir A. How to Leak a Secret[C]/ / Proc. of Asiacrypt’01. Berlin,Germany:Springer-Verlag,2001: 552-565.
  • 6Liu J K,Wei V K,Wong D S. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups[C]/ / Proc. of ACISP’04. Berlin,Germany:Springer,2004:325-335.
  • 7Au M H,Liu J K,Susilo W,et al. Certificate Based(Linkable) Ring Signature [C]/ / Proc. of ISPEC’07. Berlin, Germany:Springer,2007:79-92.
  • 8Liu J,Au M,Susilo W,et al. Linkable Ring Signature with Unconditional Anonymity[J]. IEEE Transactions on Knowledge and Data Engineering,2013,26(1):157-165.
  • 9Chaum D. Blind Signatures for Untraceable Payments [C]/ / Proc. of CRYPTO ’ 82. Santa Barbara, USA: Springer,1982:199-203.
  • 10Chaum D,Fiat A,Naor M. Untraceable Electronic Cash [C]/ / Proc. of CRYPTO ’ 88. New York, USA: Springer,1990:319-327.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部