期刊文献+

一种新的群签名成员删除问题解决方案

A New Revocable Group Signature Scheme
下载PDF
导出
摘要 文献[8]在CS97群签名方案的基础上,利用更新算子的思想,提出了一个“群数字签名中成员删除问题的更新算子方案”,在该方案中,被删除的群成员仍然可以做出签名,并且可以被验证者验证,只有群打开签名才能发现签名者的不合法身份。本文基于此方案给出一个安全的改进方案。 In the paper “A new solution scheme for the member deletion problem in group signature by use of renew operator”, Wang Shangping and Wang Yumin give a new method to solve the problem in 2003. In their solution, a new method of so-called “renew operator”is used. But we point out that in their scheme, the member who had been deleted from the group can still give out a group signature that can pass the verification successfully. Only when the group manager opens the signature can the signer's illegitimate identity be uncovered. And what is more, we give an improved group signature scheme basedupon the Wang-Wang scheme which can solve that problem.
出处 《信息工程大学学报》 2005年第3期32-35,共4页 Journal of Information Engineering University
基金 河南省杰出青年科学基金资助项目(0312001800)。
关键词 群数字签名 更新算子 成员删除问题 秘密特性密钥 group signature renew operator member deletion problem secret key
  • 相关文献

参考文献8

  • 1Chaum D, Van Heyst E. Group signatures[A]. Advances in Cryptology-EUROCRYPT'91[C]. LNCS 547, Berlin: Springer-Verlag, 1991.257-265.
  • 2Chen L, Pedersen TP. On the efficiency of group signatures providing information-theoretic anonymity[A].Advances in Cryptology-EUROCRYPT'94[C]. LNCS 950, Berlin: Springer-Verlag, 1995. 171-181.
  • 3Camenisch J. Efficient and generalized grorp signtures[A].Advances in Cryptology-EUROCRYPT'97[C]. LNCS 1233,Berlin: Springer-Verlag, 1997. 465-479.
  • 4Petersen H. How to convert any digital signature scheme into a group signature scheme[A]. Proceedings of the Security Protocols Workshop'97[C]. LNCS 1361, Berlin: Springer-Verlag, 1997. 67-78.
  • 5Camenish J,Stadler M.Efficient group signatures for large groups[A].Proc.of CRYPTO'97[C].Lecture Notes in Computer Science,1998,1541:160-174
  • 6Hyun Jeone Kim,Jong In Lim,Dong Hoon Lee.Efficient and secure member deletion in group signature schemes[A].Proc of the 3rd Int.Conf.on Information Security and Cryptology-ICISC 2000[C].lecture Notes in Computer Science,2000,2015:150-161.
  • 7Dawn Xiaodong Song.Practical Forward Secure Group Signature Schemes[A].security Information Session of World[C].U.S.A.November 2001.
  • 8王尚平,王育民,王晓峰,秦波,何成,邹又姣.群签名中成员删除问题的更新算子解决方案[J].软件学报,2003,14(11):1911-1917. 被引量:18

二级参考文献10

  • 1Chaum D, Van Heyst E. Group signtures. In: Advances in Cryptology-EUROCRYPT'91. LNCS 547, Berlin: Springer-Verlag, 1991. 257-265.
  • 2Chen L, Pedersen TP. On the efficiency of group signatures providing information-theoretic anonymity. In: DeSantis A, ed. Advances in Cryptology-EUROCRYPT'94. LNCS 950, Berlin: Springer-Verlag, 1995. 171-181.
  • 3Camenisch J. Efficient and generalized grorp signtures. In: Walter F, ed. Advances in Cryptology-EUROCRYPT'9?. LNCS 1233, Berlin: Springer-Verlag, 1997.465-479.
  • 4Petersen H. How to convert any digital signature scheme into a group signature scheme. In: Lomas M, Vaudenay M, eds. Proceedings of the Security Protocols Workshop'97. LNCS 1361, Berlin: Springer-Veflag, 1997.67-78.
  • 5Camenisch J, Stadler M. Efficient group signatures schemes for large groups. In: Kaliski BS, ed. Advances in Cryptology-CRYPT'97. LNCS 1294, Berlin: Springer-Verlag, 1997. 410-423.
  • 6Ateniese G, Tsudik G. Some open issues and new directions in group signatures. In: Franklin M, ed. Financial Cryptography Conference. LNCS 1648, 1999. 196-211.
  • 7Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash. In: Hitschfeld R, ed. Financial Cryptography Conference. LNCS 1465, Berlin: Springer-Verlag, 1998. 184-197.
  • 8Camenisch J, Michels M. Separability and efficiency for generic group signature schemes. In: Wiener M, ed. Advances in Cryptology-EUROCRYPT'99. LNCS 1666, Berlin: Springer-Verlag, 1999.411-430.
  • 9Bresson E, Stern L Efficient revocation in group signature. In: Kim K, ed. PKC 2001. LNCS 1992, Berlin: Springer-Verlag, 1999. 190-206.
  • 10Kim HJ, Lim JI, Lee DH. Efficient and secure member deletion in group signature schemes. In: Dorgho won, ed. Information Security Cryptology 2000. LNCS 2015, Berlin: Springer-Verlag, 2000. 150-161.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部