Design and Analysis of a Reliable Group Signature Scheme Based on Discrete Logarithm

Article Preview

Abstract:

Through the analysis, a group signature scheme based on discrete logarithm is put forward in this paper. strengthen the validation of the members when they join the group; Records the time stamp of the revoked member into the database, to prevent the forged signatures; To recognize the forge the signature of the revoked and illegal members. Finally, analysis shows the scheme satisfies correctness and security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4310-4313

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chaum D, Heyst E V: Group Signatures[C] Proceedings of Eurocrypt. Berlin: Springer-verlag, (1991), pp.257-265.

Google Scholar

[2] Nakanishi T, Funabiki N: Group signature schemes with membership revocation for large groups[J] IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, (2006), 89( 5), pp.1275-1283.

DOI: 10.1093/ietfec/e89-a.5.1275

Google Scholar

[3] He G, Tate S R: A group signature scheme with signature claiming and variable linkability [C] 25th IEEE International Performance, Computing and Communications Conference. Washington: IEEE Computer Society, (2006), pp.497-504.

DOI: 10.1109/.2006.1629445

Google Scholar

[4] Zhang Jian-hong, Geng Qin: On the security of group signature scheme and designated verifier signature scheme[C] Proceedings of the 2008 IEEE International Conference on Networking, Architecture, and Storage. Washington: IEEE Computer Society, (2008).

DOI: 10.1109/nas.2008.21

Google Scholar

[5] LiJun, Cui Guo-hua, Liu Zhi-yuan: Cryptanalysis and improvement of a group signature scheme[J]. Chinese Journal of Electronics,(2007), 35(4), pp.778-781.

Google Scholar

[6] Zhou S, Lin D: Group signatures with reduced bandwidth[J]. IEE Proceedings: Information Security, (2006), 153(4) , pp.146-152.

DOI: 10.1049/ip-ifs:20055141

Google Scholar

[7] Kim K, Lim S, Yie I, et al: Hierarchical identity based group signature with enhanced privacy of the signers[C]Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications. Greece: World Scientific and Engineering Academy and Society, (2007).

Google Scholar

[8] Nakanishi T, Funabiki N: A short anonymously revocable group signature scheme from decision linear assumption[C]Proceedings of the 2008 ACM Symposium Information, Computer and Communications Security. NewYork: ACM Press, (2008), pp.337-340.

DOI: 10.1145/1368310.1368359

Google Scholar

[9] Contini S , Yin Y: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions[C] Lecture Notes in Computer Science. Berlin: Springer-Verlag, (2006), 4284, pp.37-53.

DOI: 10.1007/11935230_3

Google Scholar