期刊文献+

基于环签名构造具有指定验证者的类群签名方案

A Designated Verifier Group Signature Scheme Based on Ring Signature Idea
下载PDF
导出
摘要 基于环签名思想提出一个类似门限群签名的匿名签名方案,解决了门限群签名中管理员权限过大,而环签名又无法追踪签名人身份的问题。与已有的门限群签名方案相比,因保留了环签名的部分特征,新方案具有以下优点:(1)管理员的权限受到控制,必须和签名接收方合作才能共同追踪签名者的身份;(2)能方便更改门限值;(3)方便加入或注销群成员,系统参数只需少量改变。 A threshold group signature scheme is proposed combining the idea of ring signature. This solves the problem that the threshold group manager has the absolute power in revoking the signer's identity, and the unconditional anonymity of ring signature provides chances for the criminals. Comparing to the existing ones, this scheme has following advantages: (1) The right of the group manager is restricted, he can only revoke the identity of the signer with the receiver's co-operation. (2) The threshold value is conveniently changeable. (3) It is easy to add or delete one or more the group members, and the scheme's parameters are changed little.
作者 王莉 于秀源
出处 《科技通报》 2006年第5期681-683,共3页 Bulletin of Science and Technology
基金 国家自然科学基金项目(10271037) 浙江省自然科学基金项目(M103060)
关键词 群签名 环签名 离散对数 group signature ring signature discrete logarithm
  • 相关文献

参考文献10

  • 1D Chaum,E van Heyst,Group signature.Advances in Cryptology-EUROCRYPT'91,Lecture Notes in Computer Science[J].vol.574,Springer-Verlag,1991,257-265. 被引量:1
  • 2Wang G T,Lin C H,Chang C C,Threshold signature schemes with traceable signatures in group communication.Computer Communications[J].1998,21(8):271-276. 被引量:1
  • 3Wang G T,Chang C C,Lin C H,Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2000,E83-A(6):1228-1237. 被引量:1
  • 4Wang G,Bao F,Azhou J et al.Security remarks on a group signature scheme with member deletion[A].In:Proceeding of Information and Communications Security (ICICS'3)[C].LNCS 2836,Berlin:Springer-Verlag,2003,252-265. 被引量:1
  • 5Wang G,Han X,Zhu B.On the security of two threshold signature schemes with traceable signature[A].In:Proceeding of the first MiAn Informational Conference on Applied Cryptography and Network Security (ACNS2003)[C],Kunming,2003. 被引量:1
  • 6R Rivest,A Shamir,and Y Tauman.How to leak a secret[A].In Asiacrypt'01[C].LNCS 2248,552-565. 被引量:1
  • 7M Abe,M Ohkubo,K Suzuki.1-out-of-n signatures from a variety of keys[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.415-423. 被引量:1
  • 8Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480. 被引量:1
  • 9Qianhong Wu,Jilin Wang,Yumin Wang.T-out-of-n Ring Signature from Discrete Logarithm Public Keys[M]..密码学进展-CHINACRYPT'2004.北京:科学出版社,2004.209-214. 被引量:1
  • 10王继林,张键红,王育民.基于环签名思想的一种类群签名方案[J].电子学报,2004,32(3):408-410. 被引量:13

二级参考文献5

  • 1[1]D Chaum,E van Heyst.Group signatures[A].LNCS 547,Proc of Eurocrypt'91[C].Berlin:Springer-Verlag,1992.257-265. 被引量:1
  • 2[2]R L Rivest,A Shamir,Y Tauman.How to leak a secret[A].LNCS 2248,Proc of Asiacrypt01[C].Berlin:Springer-Verlag,2001.552-565. 被引量:1
  • 3[3]Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480. 被引量:1
  • 4[4]M Abe,M Ohkubo,K Suzuki.1-out -of-n signatures from a variety of keys[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.415-423. 被引量:1
  • 5[5]Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.533-574. 被引量:1

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部