A Practical ID-Based Group Signature Scheme

被引:5
|
作者
Cheng, Xiangguo [1 ]
Zhou, Shaojie [2 ]
Yu, Jia [1 ]
Li, Xin [1 ]
Ma, Huiran [1 ]
机构
[1] Qingdao Univ, Sch Informat Engn, Qingdao 266071, Peoples R China
[2] Harbin Univ Sci & Technol, Coll Measure Control Technol & Commun Engn, Harbin 150040, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
ID-Based Signature; Group Signature; Short Signature; Bilinear Pairing; Anonymity;
D O I
10.4304/jcp.7.11.2650-2654
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A new ID-based group signature scheme, in which group managers (Membership Manager and Tracing Manager) and group members are all ID-based, is presented in this paper. Due to the nice constructive method of group signature schemes and the sound properties of bilinear pairing, it is shown that our scheme has the advantages of concurrent joining of users, immediate revocation of group members, easy tracing of signature signers and short length of signatures. Furthermore, it is trapdoor-free. The security analysis is under the formal security notion of an ID-based dynamic group signature scheme.
引用
收藏
页码:2650 / 2654
页数:5
相关论文
共 50 条
  • [21] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [22] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [23] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    WuhanUniversityJournalofNaturalSciences, 2005, (03) : 555 - 558
  • [24] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [25] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [26] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [27] ID-based signature scheme without trusted PKG
    Liao, J
    Xiao, JF
    Qi, YH
    Huang, PW
    Rong, MT
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
  • [28] Leakage-resilient ID-based signature scheme in the generic bilinear group model
    Wu, Jui-Di
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3987 - 4001
  • [29] NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS
    Kwangjo Kim
    JournalofElectronics, 2006, (06) : 892 - 900
  • [30] NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS
    Kwangjo Kim
    Journal of Electronics(China), 2006, (06) : 892 - 900