期刊文献+

一个基于ID的可删除群签名方案 被引量:1

A ID-based revocable group signature scheme
下载PDF
导出
摘要 在第三方不可信任的情况下,传统的ID签名系统不适用于安全的群签名。给出一个安全的基于ID的群签名方案,即使在密钥生成中心(KGC)不可信的情况下,也能保证其安全性,而且该方案可以安全地增加或删除群成员而不需要改变其他有效群成员密钥和群公开密钥。同时,密钥的长度及签名的长度与群成员的多少无关。 In the case that third parties can not be trusted, the traditional ID signature security system does not suit for the group signature. A secure ID-based group signature scheme was proposed. Even when the Key Generation Center (KGC) was implausible, its safety could be ensured, and the group members could be safely added or deleted without changing the keys of other effective group members and public group key. At the same time, the lengths of key and signature were unrelated to the number of group members.
出处 《计算机应用》 CSCD 北大核心 2008年第4期918-920,共3页 journal of Computer Applications
关键词 群签名 ID加密 二次线性对映射 group signature ID-based cryptography bilinear pair mapping
  • 相关文献

参考文献9

  • 1CHAUM D, Van HEYST E. Group signatures[C]// Advances in Cryptology- EUROCRYPT'91, LNCS 547, Berlin: Springer-Verlag, 1991:257-265.
  • 2CHEN L, PEDERSEN T P. On the efficiency of group signatures providing information-theoretic anonymity[ C]// De SANTIS A, ed. Advances in Cryptology - EUROCRYPT'94, LNCS 950. Berlin: Springer-Verlag, 1995:171 - 181.
  • 3CAMENISCH J. Efficient and generalized group signatures[ C]// WALTER F, ed. Advances in Cryptology - EUROCRYPT'97, . LNCS 1233. Berlin: Springer-Verlag, 1997:465-479.
  • 4PETERSEN H. How to convert any digital signature scheme into a group signature scheme[C]// LOMAS M, VAUDENAY M, ed. Proceedings of the Security Protocols Workshop'97, LNCS 1361. Berlin: Springer-Verlag, 1997:67-78.
  • 5CAMENISCH J, STADLER M. Efficient group signatures schemes for large groups[ C]// Proceedings of CRYPTO'97, LNCS 1541. Berlin: Springer-Verlag, 1998:160-174.
  • 6陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 7CHEN X, ZHANG F, KIM M. A New ID-based Group Signature Scheme from Bilinear Pairings[ EB/OL]. [2007 - 10 -01]. http:// citeseer. ist. psu. edu/article/chen03new. html.
  • 8KIM H J, LIM J I, LEE D H. Efficient and secure member deletion in group signature schemes[ C]//Proceedings of the 3rd International Conference on Information Security and Cryptology - ICISC 2000, LNCS 2015. Berlin: Springer-Verlag, 2000:150 - 161.
  • 9SONG D X. Practical forward secure group signature schemes[ C]// Proceedings of ACM Conference on Computer and Communications Security. New York: ACM Press, 2001:225-234.

二级参考文献12

  • 1Chaum D,Heyst V E.Group signatures[A].Proc of EUROCRYPT'91[C].Lecture Notes in Computer Science,1991,547:257-265.
  • 2Camenish J,Stadler M.Efficient group signatures for large groups[A].Proc.of CRYPTO'97[C].Lecture Notes in Computer Science,1997,1296:410-424.
  • 3Camenish J,Michels M.A group signature scheme with improved efficiency[A].Proc.of ASIACRYPT'98[C].Lecture Notes in Computer Science,1998,1541:160-174.
  • 4Ateniese G,Tsudik G.Some open issues and new directions in group signatures[OL].http://www.isi.edu/-gts/pubs.html.
  • 5Chen L,Pedersen T.New group signature schemes[A].Proc.of EUROCRYPT'94[C].Lecture Notes in Computer Science.1995,950:171-181.
  • 6Camenish J.Efficient and generalized group signatures[A].Proceedings of CRYPTO'93[C].Lecture Notes in Computer Science,1993,1233:302-318.
  • 7Kims J,Parks J,Won D H.Group signatures for hierarchical multigroups[J].Lecture Notes in Computer Science,1998,1163:273-281.
  • 8Hysyansksya A,Ramzan Z.Group blind digital signatures:A scalable solution to electronic cash[A].Pro.of the 2ndFinancial Cryptography Conference[C].Anguilla,BWI,1998.184-197.
  • 9Park S,Kims J,Wond H.A practical identity based group signature[A].Conference on Electronics,Information and Communications (ICEIC'95)[C].China,1995.64-67.
  • 10Petersen H.How to convert any digital signature scheme into a group signature scheme[M].Security Protocols Workshop,Paris,1997.177-190.

共引文献55

同被引文献7

  • 1Park S,Kim S,Won D.ID-based group signature[J].Electronics Letters, 1997,33(19) : 1616-1617.
  • 2Mao W,Lim C H.Cryptanalysis in prime order subgroup of Zn[C]// LNCS 1514:Advances in Cryptology-Asiacrypt' 1998,1998:214-226.
  • 3Tseng Y,Jan J.A novel ID-based group signature[J].Information Science, 1999,120(1) : 131-141.
  • 4Joye M,Kim S, Lee N.Cryptanalysis of two group signature schemes[C]//LNCS 1729:Information Security Workshop(ISW'99). Berlin: Springer-verlag, 1999 : 271-275.
  • 5Joye M.On the difficulty of coalition-resistance in group signature schemes[C]//The Second Workshop on Security in Communicatiou Networks( SCN' 99 ).Berlin: Springer-verlag, 1999:16-17.
  • 6Chen Xiao-feng,Zhang Fang-guo,Kim K.A new ID-based group signature scheme from Bilinear Pairings[EB/OL].(2003)[2008].http:// eprint.iacr.org/2003/116.
  • 7吴秋新,钟鸣,杨义先,胡正名.一个数字群签名方案的安全性分析[J].通信学报,2001,22(11):72-76. 被引量:7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部