• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
Citation: Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.

Efficient Certificateless Signature and Group Signature Schemes

More Information
  • Published Date: February 14, 2010
  • Group signatures are studied in newly proposed certificateless public key setting. The security model for the certificateless group signature scheme is put forward. Using bilinear pairings, a certificateless signature scheme is presented, which is formally proven in the random oracle. At the same time, a group signature scheme, based on the certificateless signature scheme given in this paper, is constructed. The former is computationally efficient in that it just needs one pairing operation in its signing and verification phases, the latter just needs two pairing operations. So they have advantage in performance. The security of these schemes is based on the fact that the computational Diffie-Hellman problem is hard. This group signature scheme not only enjoys all the security requirements of a group signature, but also is a dynamic group signature scheme that allows users to join or leave the group freely without updating the group public key and other group members private signing key. Besides, the length of the signature is independent of the numbers of the group members. Due to its security, high efficiency and freedom from certificate management, the group signature scheme may have practical applications in electronic commerce and electronic voting, etc.
  • Related Articles

    [1]Fan Wei, Liu Yong. Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer[J]. Journal of Computer Research and Development, 2022, 59(8): 1757-1769. DOI: 10.7544/issn1000-1239.20220064
    [2]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [3]Xu Mingda, Zhang Zike, Xu Xiaoke. Research on Spreading Mechanism of False Information in Social Networks by Motif Degree[J]. Journal of Computer Research and Development, 2021, 58(7): 1425-1435. DOI: 10.7544/issn1000-1239.2021.20200806
    [4]Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155
    [5]Liao Guoqiong, Jiang Shan, Zhou Zhiheng, Wan Changxuan. Dual Fine-Granularity POI Recommendation on Location-Based Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2600-2610. DOI: 10.7544/issn1000-1239.2017.20160502
    [6]Tan Zhenhua, Shi Yingcheng, Shi Nanxiang, Yang Guangming, Wang Xingwei. Rumor Propagation Analysis Model Inspired by Gravity Theory for Online Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2586-2599. DOI: 10.7544/issn1000-1239.2017.20160434
    [7]Wang Zhenwen, Xiao Weidong, and Tan Wentang. Classification in Networked Data Based on the Probability Generative Model[J]. Journal of Computer Research and Development, 2013, 50(12): 2642-2650.
    [8]Tan Wentang, Wang Zhenwen, Yin Fengjing, Ge Bin, and Xiao Weidong. A Partial Comparative Cross Collections LDA Model[J]. Journal of Computer Research and Development, 2013, 50(9): 1943-1953.
    [9]Guo Qiaojin, Li Ning, Yang Yubin, and Wu Gangshan. LDA-CRF: Object Detection Based on Graphical Model[J]. Journal of Computer Research and Development, 2012, 49(11): 2296-2304.
    [10]Li Zhi, Li Qianmu, Zhang Hong, Liu Fengyu. Closely Social Circuit Based Routing in Social Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1185-1195.

Catalog

    Article views (1068) PDF downloads (1882) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return