期刊文献+

一个基于ID的可删除群签名方案

ID-based revocable group signature scheme
下载PDF
导出
摘要 在第三方不可信任的情况下,传统的ID签名系统不适用于安全的群签名。给出一个安全的基于ID的群签名方案,即使在KGC不可信的情况下也能保证其安全性,而且该方案可以安全地增加或删除群成员而不需要改变其他有效群成员密钥和群公开密钥。同时,密钥长度及签名长度与群成员的多少无关。 This paper argued that traditional ID-based systems from pairing seem unsuitable for designing group signature schemes due to the problem of key escrow. It proposed a new ID-based group signature without trustful KGC from bilinear pairing. In the new ID-based system, if dishonest KGC impersonated a honest user to communicate with others, the user eould provide a proof of treachery of the KGC afterwards. Moreover, this scheme could safely delete the group member without changing secret keys of the other available group members and public keys of the group. At the same time, the size of the group public key and the length of the signature were independent on the numbers of the group members.
出处 《计算机应用研究》 CSCD 北大核心 2008年第3期924-926,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10501053)
关键词 群签名 ID加密 二次线性对映射 group signature ID-based cryptography bilinear pairings
  • 相关文献

参考文献10

  • 1CHAUM D, HEYST E van. Group signatures[ C ]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1991 : 257-265.
  • 2CHEN L, PEDERSEN T P. On the efficiency of group signatures providing information-theoretic anonymity [ C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1995:171-181.
  • 3CAMENISH J. Efficient and generalized group signatures [ C ]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1997 : 465- 479.
  • 4PETERSEN H. How to convert any digital signature scheme into a group signature scheme [ C ]//Lecture Notes in Computer Science. Berlln: Springer-Verlag, 1997 : 67-78.
  • 5CAMENISH J, STADLER M. Efficient group signatures for large groups[ C ]//Lecture Notes in Computer Science. Berlin : Springer-Verlag, 1998: 160-174.
  • 6KIM H J, LIM J I, LEE D H. Efficient and secure member deletion in group signature schemes [ C ]//Lecture Notes in Computer Science. Berlin : Springer-Verlag, 2000 : 150 - 161.
  • 7SONG Xiao-dong. Practical forward secure group signature schemes [ EB/OL]. htto://tdt, situ. edu. cn/.
  • 8陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 9CHEN Xiao-feng, ZHANG Fang-guo, KIM K. A new ID-based group signature scheme from bilinear pairings [ EB/OL ]. (2003). http:// eprint, iacr. org/.
  • 10HESS E. Exponent group signature schemes and efficient identity based signature schemes based on pairings [ EB/OL]. ( 2002 ). http ://eprint. iacr. org/.

二级参考文献12

  • 1Chaum D,Heyst V E.Group signatures[A].Proc of EUROCRYPT'91[C].Lecture Notes in Computer Science,1991,547:257-265.
  • 2Camenish J,Stadler M.Efficient group signatures for large groups[A].Proc.of CRYPTO'97[C].Lecture Notes in Computer Science,1997,1296:410-424.
  • 3Camenish J,Michels M.A group signature scheme with improved efficiency[A].Proc.of ASIACRYPT'98[C].Lecture Notes in Computer Science,1998,1541:160-174.
  • 4Ateniese G,Tsudik G.Some open issues and new directions in group signatures[OL].http://www.isi.edu/-gts/pubs.html.
  • 5Chen L,Pedersen T.New group signature schemes[A].Proc.of EUROCRYPT'94[C].Lecture Notes in Computer Science.1995,950:171-181.
  • 6Camenish J.Efficient and generalized group signatures[A].Proceedings of CRYPTO'93[C].Lecture Notes in Computer Science,1993,1233:302-318.
  • 7Kims J,Parks J,Won D H.Group signatures for hierarchical multigroups[J].Lecture Notes in Computer Science,1998,1163:273-281.
  • 8Hysyansksya A,Ramzan Z.Group blind digital signatures:A scalable solution to electronic cash[A].Pro.of the 2ndFinancial Cryptography Conference[C].Anguilla,BWI,1998.184-197.
  • 9Park S,Kims J,Wond H.A practical identity based group signature[A].Conference on Electronics,Information and Communications (ICEIC'95)[C].China,1995.64-67.
  • 10Petersen H.How to convert any digital signature scheme into a group signature scheme[M].Security Protocols Workshop,Paris,1997.177-190.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部