A Practical ID-Based Group Signature Scheme

被引:5
|
作者
Cheng, Xiangguo [1 ]
Zhou, Shaojie [2 ]
Yu, Jia [1 ]
Li, Xin [1 ]
Ma, Huiran [1 ]
机构
[1] Qingdao Univ, Sch Informat Engn, Qingdao 266071, Peoples R China
[2] Harbin Univ Sci & Technol, Coll Measure Control Technol & Commun Engn, Harbin 150040, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
ID-Based Signature; Group Signature; Short Signature; Bilinear Pairing; Anonymity;
D O I
10.4304/jcp.7.11.2650-2654
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A new ID-based group signature scheme, in which group managers (Membership Manager and Tracing Manager) and group members are all ID-based, is presented in this paper. Due to the nice constructive method of group signature schemes and the sound properties of bilinear pairing, it is shown that our scheme has the advantages of concurrent joining of users, immediate revocation of group members, easy tracing of signature signers and short length of signatures. Furthermore, it is trapdoor-free. The security analysis is under the formal security notion of an ID-based dynamic group signature scheme.
引用
收藏
页码:2650 / 2654
页数:5
相关论文
共 50 条
  • [41] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [42] An ID-based Anonymous-message Anonymous Signature Scheme
    Zhang, Jianhong
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [43] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +
  • [44] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [45] Improved ID-based signature scheme solving key escrow
    Dept. of Electronic Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 2 (121-126):
  • [46] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [47] An improved ID-based restrictive partially blind signature scheme
    Wang, Shangping
    Han, Pei
    Zhang, Yaling
    Wang, Xiaofeng
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 295 - 300
  • [48] A Novel ID-Based Strong Designated Verifier Signature Scheme
    Du, Hongzhen
    Huang, Meijuan
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2870 - 2874
  • [49] Improved ID-Based Signature Scheme Solving Key Escrow
    廖剑
    戚英豪
    黄佩伟
    戎蒙括
    李生红
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 121 - 126
  • [50] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420