Group Signature Member Deletion Scheme Based on Discrete Logarithm and Factorization

被引:0
|
作者
Yao, Junping [1 ]
Li, Xinshe [1 ]
Li, Yuan [1 ]
Zeng, Jingjing [1 ]
机构
[1] High Technol Inst, Xian, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been proven to be unsafe to make the deleted member fail to pass the group signature and make the legal member implement the scheme of valid signature through updating operator scheme. Then the secret property key updating of legal member cannot be accomplished by each legal member. In this paper, a new secret property key updating operator is designed, whose work of updating the group member secret property key is done by group administrator. Its security is based on the discrete logarithm and factorization difficulty, which is resistant to collusion attacks.
引用
收藏
页码:196 / 203
页数:8
相关论文
共 50 条
  • [1] A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems
    Duran Diaz, R.
    Hernandez Encinas, L.
    Munoz Masque, J.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 143 - 150
  • [2] Efficient group signature scheme based on the discrete logarithm
    Lee, WB
    Chang, CC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (01): : 15 - 18
  • [3] Improved group signature scheme based on discrete logarithm problem
    Sun, HM
    ELECTRONICS LETTERS, 1999, 35 (16) : 1323 - 1324
  • [4] Improved group signature scheme based on discrete logarithm problem
    Natl Chung Hsing Univ, Taichung, Taiwan
    Electron Lett, 1 (37-38):
  • [5] Improved group signature scheme based on discrete logarithm problem
    Tseng, YM
    Jan, JK
    ELECTRONICS LETTERS, 1999, 35 (01) : 37 - 38
  • [6] A Disordered Multiple Group Signature Scheme Based on Discrete Logarithm
    Huang, Hua
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 323 - 325
  • [7] A new threshold group signature scheme based on discrete logarithm problem
    Li, Fengyin
    Yu, Jiguo
    Ju, Hongwei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 1176 - +
  • [8] Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (8-10) : 736 - 744
  • [9] Signature scheme based on composite discrete logarithm
    Tan, CH
    Yi, X
    Siew, CK
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1702 - 1706
  • [10] Security remarks on a group signature scheme with member deletion
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 72 - 83