A traceable group signature scheme

被引:0
|
作者
Chen, JJR
Liu, YC
机构
[1] Natl Def Management Coll, Jung Ho Taipei 235, Taiwan
[2] Ta Hwa Inst Technol, Hsinchu, Taiwan
关键词
cryptosystem; group signature; LUC function; factorization problem; discrete logarithm problem;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Camenisch [1] links Chaum's [2] blind signature and claims to solve the length problems of group public key and of anonymous digital signature. However, a heavy time burden in verification weakens digital signature. This;paper is to develop a new and faster digital anonymous signature system by linking the LUC function with the complexities of discrete logarithm and factorization. Our scheme is free from the change in public key, private key, and semipublic key if there is any change in the group internal membership. Our verification needs smaller volume than the Camenisch method [1] does, is easier to implement, and can be applied to large computer networks. (C) 2000 Elsevier Science Ltd. All rights reserved.
引用
下载
收藏
页码:147 / 160
页数:14
相关论文
共 50 条
  • [41] An efficient threshold group signature scheme
    Hu, Chengyu
    Li, Daxing
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +
  • [42] Cryptanalysis and improvement of a group signature scheme
    College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
    Tien Tzu Hsueh Pao, 2007, 4 (778-781):
  • [43] Colluding attacks on a group signature scheme
    郭兴阳
    唐朝京
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2005, (10) : 1011 - 1014
  • [44] An efficient threshold group signature scheme
    Chen, TS
    Hsiao, TC
    Chen, TL
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B13 - B16
  • [45] An efficient threshold group signature scheme
    Yu, YL
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 362 - 371
  • [46] Colluding attacks on a group signature scheme
    Guo X.-Y.
    Tang C.-J.
    Journal of Zhejiang University-SCIENCE A, 2005, 6 (10): : 1011 - 1014
  • [47] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    Journal of Electronics(China), 2003, (04) : 274 - 278
  • [48] Analysis and improvement of a group signature scheme
    Liu, Dan-Ni
    Wang, Xing-Wei
    Guo, Lei
    Huang, Min
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (02): : 189 - 192
  • [49] On/Off Threshold Group Signature Scheme
    Wang Xiaoming
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 69 - 73
  • [50] Generalized group proxy signature scheme
    Jia, Huijuan
    Liu, Yanfei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 287 - 291