期刊文献+

基于身份的短群签名方案 被引量:1

An ID-based Short Group Signature Scheme
下载PDF
导出
摘要 给出一种新的基于身份的群成员和群管理员的群签名方案。由于新方案的构造不需要零知识证明,群签名的产生是由群成员和群管理员合作完成的,所以新方案具有结构简单、签名长度短、群成员的加入和撤销可以即时实现、群签名的跟踪快捷的优点。 A new ID-based group signature scheme, whose group managers and group members are all ID- based, is presented. Because the scheme does not require zero knowledge proof and the group signature is generated by a group member in collaboration with the group manager, the scheme has the advantages of simple structure, short signature length, concurrent join of users, immediate revocation of group mem-bers, easy tracing of group signatures.
出处 《青岛大学学报(自然科学版)》 CAS 2012年第3期57-61,共5页 Journal of Qingdao University(Natural Science Edition)
关键词 基于身份的签名 群签名 短签名 双线性对 匿名性 可跟踪性 ID-based signature group signature short signature bilinear pairing anonymity traceability
  • 相关文献

参考文献19

  • 1Ateniese G,Medeiros B de. Efficient group signatures without trapdoors [C]. Proc. Asiacrypt, LNCS,Springer-Ver-lag, 2003,2894: 246 - 268.
  • 2Kim S,ParkS,Won D. Convertible group signatures [C]. Proc. Asiacrypt, LNCS, Springer-Verlag,1996, 1163 : 311-321.
  • 3Ateniese G,Camenisch J,Joye M,Tsudik G. A practical and provably secure coalition-resistant group signature scheme[C]. Proc. Crypto 2000,LNCS,Springer-Verlag? 2000, 1880 : 255 - 270.
  • 4Park S,Kim S,Won D. ID-based group signature[J]. Electronics Letters,1998,33 (19) : 1616 - 1617.
  • 5Mao W, Lim C H. Cryptanalysis in prime order subgroup of Zn [C]. Proc. Asiacrypt 1998,LNCS 1514, Springer-Ver-lag, 1998,1514:214 -226.
  • 6Tseng Y M, Jan J K. A novel ID-based group signature [J]. Information sciences, 1999,120(1-4) : 131 - 141.
  • 7Joye M, Kim S, Lee N. Cryptanalysis of two group signature schemes [C]. Proc. Information Security 1999, LNCS1729, Springer-Verlag? 1999,1729:271 -275.
  • 8Joye M. On the difficulty coalition-resistance in group signature schemes[R].Technique Report, LCIS-99-6B, 1999.
  • 9Chen Xiaofeng, Zhang Fangguo,Kim K. A new ID-based group signature scheme from bilinear pairings[R] .CryptologyePrint Archive,Report 2002/184, 2002,http://eprint.iacr. org.
  • 10Wei V K,Yuen T H,Zhang Fangguo. Group signature where group manager, members and open authority are identi-ty-based [CJ. Proc. Information Security and Privacy (ACISP 2005) , Springer-Verlag, 2005, 3574:468 - 480.

二级参考文献31

  • 1王晓明,陈火炎,符方伟.动态门限群签名方案[J].计算机学报,2004,27(9):1182-1186. 被引量:12
  • 2张晓敏,张建中.基于ElGamal数字签名的零知识证明身份鉴别方案[J].计算机工程与应用,2006,42(34):131-132. 被引量:5
  • 3崔国华,李俊.一种适合大群组的高效群签名方案[J].计算机科学,2007,34(2):79-81. 被引量:3
  • 4Chaum D, Heyst F group signature[C]//LNCS: Proceeding of EURO- CRYPT' 91 .[S.l.]: Spring-Verlag, 1991 : 257-265.
  • 5Camenish J,Stadle M.Efficient group signature scheme for large groups[C]//LNCS 1294: Advences in Cryptology-CRPTO' 97.Berlin: Spring-Verlag, 1997 : 410-424.
  • 6Ateniese A,Camenisch J,Joye M,et al.A pratical and provebly secure coaliti on resister group signature scheme[C]//Bellare M.LNCS 1880:Advance in Cryptology-CRYPTO'00.[S.l.]:Spring-Verlag,20,00: 255-270.
  • 7CAMENISCH J.Efficient and generalized group signatures[C].In:Advances in Cryptology-EUROCRYPT'97,LNCS 1233,Berlin:SpringerVerlag, 1997:465~479.
  • 8SCHNORR C P. Efficient signature generation for smart cards[J].Journal of Cryptology, 1991; 14(3): 161~174.
  • 9Chaum D et al.Group signatures[C].In:Advances in Cryptology-Eurocrypt'91,Berlin:Springer Uerlag,1992:257~265.
  • 10National Institute of Standards and Technology. NIST FIPS PUB 186[S].Digital Signature Standard,U S Department of Commerce,1994-05.

共引文献6

同被引文献19

  • 1董亮,肖国镇.一种基于身份的群签名方案[J].计算机科学,2005,32(11):69-71. 被引量:1
  • 2Chaum D, Heyst E. Group Signatures [C]. Proceedings of EUROCRYPT 1991, Berlin: Springer-Verlag, 1991:257 -265.
  • 3Lysynskaya A, Ramzan Z. Group blind digital signatures: a scalable solution to electronic cash [C]. Financial Cryptography (FC98), Berlin~ Springer-Verlag, 1998 : 184 - 197.
  • 4Cbaum D, Pedersen T. Wallet databases with observers [C]. Advances in Cryptology-CRYPTO92, Berlin: Springer-Verlag, 1993:89 - 105.
  • 5Kilian J, Petrank E. Identity escrow[C]. Advances in Cryptology-CRYPTO98, Lecture Notes of Computer Science, Berlin: Springer- Verlag, 1998 : 169 - 185.
  • 6Bringe J, Chabanne H, Pointcheval D, et al. An application of the Boneh and Shacham group signature scheme to biometric authentication [C]. Proceedings of the 3rd International Workshop on Seeurity(IWSEC08), Berlin: Springer-Verlag, 2008:219 -230.
  • 7Shamir A. Identity-Based Cryptosystems and Signature Schemes[C]. Proceedings of CRYPTO 84, Lecture Notes in Computer Science, Berlin : Springer-Verlag, 1984 : 47 - 53.
  • 8Anderson R. Two Remarks on Public Key Cryptography[C]. Invited lecture of the Fourth Annual Conference on Computer and Commu nications Security, New York: ACM Press, 1997:89- 92.
  • 9Bellaire M, Miner SK. A Forward-Secure Digital Signature Scheme[C]. Advances in Cryptology-Crypto' 99 LNCS 1666, Berlin : Spring- er-Verlag, 1999:431 - 448.
  • 10Song D X. Practical forward secure group signature schemes[C]. In Proceedings of the 8th ACM Conf on Computer and Communications Security(CCS 2001), New York: ACM Press, 2001: 225- 234.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部