期刊文献+

一种基于离散对数的群签名方案

A Group Signature Scheme Based on Discrete Logarithm
下载PDF
导出
摘要 提出一种基于离散对数的群签名方案。成员加入群时,认证中心(CA)验证成员身份,确保非法成员无法冒充合法成员加入群;成员退出群时,CA记录撤销时间,避免失效成员继续签名,成员签名需要得到CA认可方可发送给接收者,并且该签名也被群管理员记录在数据库中,以备将来发生纠纷时使用。分析表明,所提方案生成的签名信息具有准确性和防伪造性,并能识别非法成员伪造签名,具有一定的安全性。 A group signature scheme based in discrete logarithm is proposed. When a new member attend to join the group, the Certification Authority(CA) will validate the identify of this member to ensure the unauthorized members unable to join the group. When the member leaves the group, CA will record the withdraw time to avoid outdated members can continue to use the signature. The signature can only be sent to receiver after CA approved. And the signatures will be recorded in database by group administrator which can be reserved for future using. Analysis shows the signature generated by this proposed scheme satisfies sufficient security.
作者 陈秀寓
出处 《计算机安全》 2010年第3期32-33,共2页 Network & Computer Security
关键词 群签名 认证中心(CA) 数字签名 安全性 group signature Certification Authority(CA) digital signature security
  • 相关文献

参考文献9

  • 1Chaum D, Heyst E V. Group Signatures[C] // Proceedings of Eurocrypt. Berlin: Springer-verlag, 1991 : 257 - 265.
  • 2Nakanishi T, Funabiki N, Group signature schemes with membership revocation for large groups[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2006, 89( 5): 1275-1283.
  • 3He G, Tare S P.. A group signature scheme with signature claiming and variable linkability [C] // 25th IEEE International Performance, Computing, and Communications Conference. Washington: IEEE Computer Society, 2006:497-504.
  • 4Zhang Jian-hong, Geng Qin. On the security of group signature scheme and designated verifier signature scheme[C] //Proceedings of the 2008 IEEE International Conference on Networking, Architecture, and Storage. Washington: IEEE Computer Society, 2008:351-358.
  • 5李俊,崔国华,刘志远.一个群签名方案的密码学分析与改进[J].电子学报,2007,35(4):778-781. 被引量:16
  • 6Zhou S, Lin D. Group signatures with reduced bandwidth[J]. IEE Proceedings: Information Security, 2006, 153(4): 146-152.
  • 7Kim K, Lira S, Yie I, et al. Hierarchical identity based group signature with enhanced privacy of the signers[O]//Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications. Greece: World Scientific and Engineering Academy and Society, 2007:29-33.
  • 8Nakanishi T, Funabiki N. A short anonymously revocable group signature scheme from decision linear assumption[C]// Proceedings of the 2008 ACM Symposium Information, Computer and Communications Security. NewYork: ACM Press, 2008: 337-340.
  • 9Contini S , Yin Y. Forgery and partial key--recovery attacks on HMAC and NMAC using hash collisions[C]// Lecture Notes in Computer Science. Berlin: Springer--Verlag, 2006, 4284: 37-53.

二级参考文献7

  • 1陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 2Chaum D,Heyst V E.Group Signatures[A].In Proc.EUROCRYPT' 91[C].LNCS 547,Berlin:Springer-Verlag,1991.257-265.
  • 3Camenish J,Stadler M.Efficient group signatures for large groups[A].In Proc CRYPTO' 97[C].LNCS 1296,Berlin:Springer-Verlag,1997.410-424.
  • 4Hyun Jeong Kim,Jong In Lim,Dong Hoon Lee.Efficient and secure member deletion in group signature schemes[A].In Proc ICISC 2000[C].LNCS 2015,Berlin:Springer-Verlag,2000.150-161.
  • 5Ateniese G,Tsudik G.Some open issues and new directions in group signatures[A].In Proc Financial Cryptography' 99[C].LNCS 1648,Berlin:Springer-Verlag,1999.196-211.
  • 6John M.DeLaurentis.A further weakness in the common modulus protocol for the RSA cryptosystem[J].Cryptologia,1984,8(3):253-259.
  • 7Dan Boneh.Twenty years of attacks on the RSA cryptosystem[J].Notices of the American Mathematical Society,1999,46(2):203-213.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部