A traceable group signature scheme

被引:0
|
作者
Chen, JJR
Liu, YC
机构
[1] Natl Def Management Coll, Jung Ho Taipei 235, Taiwan
[2] Ta Hwa Inst Technol, Hsinchu, Taiwan
关键词
cryptosystem; group signature; LUC function; factorization problem; discrete logarithm problem;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Camenisch [1] links Chaum's [2] blind signature and claims to solve the length problems of group public key and of anonymous digital signature. However, a heavy time burden in verification weakens digital signature. This;paper is to develop a new and faster digital anonymous signature system by linking the LUC function with the complexities of discrete logarithm and factorization. Our scheme is free from the change in public key, private key, and semipublic key if there is any change in the group internal membership. Our verification needs smaller volume than the Camenisch method [1] does, is easier to implement, and can be applied to large computer networks. (C) 2000 Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:147 / 160
页数:14
相关论文
共 50 条
  • [1] Traitor traceable signature scheme
    Watanabe, Y
    Zheng, YL
    Imai, H
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 462 - 462
  • [2] Traceable scheme for anonymous signature
    Zhang, Xiang-De
    Xu, Ming
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2006, 27 (09): : 965 - 967
  • [3] A Group-Oriented (t,n) Threshold Signature Scheme with Traceable Signers
    TAN Zuowen1
    2. State Key Laboratory of Information Security/Institute of Software
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 680 - 684
  • [4] A threshold RSA signature scheme with traceable signers
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    [J]. Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
  • [5] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [6] Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management
    Jiao, Dong
    Li, Mingchu
    Ou, Jinping
    Guo, Cheng
    Ren, Yizhi
    Cui, Yongrui
    [J]. IET INFORMATION SECURITY, 2013, 7 (04) : 343 - 348
  • [7] TRACEABLE IDENTITY- BASED GROUP SIGNATURE
    Gu, Ke
    Yang, Lihao
    Wang, Yong
    Wen, Sheng
    [J]. RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2016, 50 (03): : 193 - 226
  • [8] A Traceable Universal Designated Verifier Transitive Signature Scheme
    Hou, Shaonan
    Lin, Chengjun
    Yang, Shaojun
    [J]. INFORMATION, 2024, 15 (01)
  • [9] A traceable threshold signature scheme with multiple signing policies
    Shao, Jun
    Cao, Zhenfu
    [J]. COMPUTERS & SECURITY, 2006, 25 (03) : 201 - 206
  • [10] A Traceable Ring Signature Scheme Based on Coding Theory
    Branco, Pedro
    Mateus, Paulo
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 387 - 403