• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.
Citation: Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.

Research on Group Signature Scheme with Forward Security

More Information
  • Published Date: December 14, 2006
  • Based on the basic theories of RSA signature, GQ signature, and IR forward secure signature, a group signature scheme with forward security is presented. In this signature scheme, the key server only generates one public key for all members of group and all members share this public key. At the same time, the key server also generates the secret key “seeds” for each member, thus, each member can only get one secret key “seed”. During each time period, each member of group can generate or update his own secret key by using the secret key generation algorithm or the secret key update algorithm. By analyzing the performance of the digital signature, a conclusion may be drawn. It can be described as follows: In a group communication that includes n members, if the digital signature is adopted, and even (n-1) members corrupt, the only one legal member is still secure under such attacks.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [3]An Zhongqi, Zhang Yunyao, Xing Jing, Huo Zhigang. Optimization of the Key-Value Storage System Based on Fused User-Level I/O[J]. Journal of Computer Research and Development, 2020, 57(3): 649-659. DOI: 10.7544/issn1000-1239.2020.20180799
    [4]Xu Ming, Fan Yimeng, Jiang Changjun. Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670. DOI: 10.7544/issn1000-1239.2019.20190040
    [5]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [6]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [9]Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.
    [10]Zheng Ji. An MDP Public-Key Digital Signature Scheme[J]. Journal of Computer Research and Development, 2005, 42(2).

Catalog

    Article views (805) PDF downloads (524) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return