• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.
Citation: Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.

Research on Group Signature Scheme with Forward Security

More Information
  • Published Date: December 14, 2006
  • Based on the basic theories of RSA signature, GQ signature, and IR forward secure signature, a group signature scheme with forward security is presented. In this signature scheme, the key server only generates one public key for all members of group and all members share this public key. At the same time, the key server also generates the secret key “seeds” for each member, thus, each member can only get one secret key “seed”. During each time period, each member of group can generate or update his own secret key by using the secret key generation algorithm or the secret key update algorithm. By analyzing the performance of the digital signature, a conclusion may be drawn. It can be described as follows: In a group communication that includes n members, if the digital signature is adopted, and even (n-1) members corrupt, the only one legal member is still secure under such attacks.
  • Related Articles

    [1]Fan Wei, Liu Yong. Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer[J]. Journal of Computer Research and Development, 2022, 59(8): 1757-1769. DOI: 10.7544/issn1000-1239.20220064
    [2]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [3]Xu Mingda, Zhang Zike, Xu Xiaoke. Research on Spreading Mechanism of False Information in Social Networks by Motif Degree[J]. Journal of Computer Research and Development, 2021, 58(7): 1425-1435. DOI: 10.7544/issn1000-1239.2021.20200806
    [4]Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155
    [5]Liao Guoqiong, Jiang Shan, Zhou Zhiheng, Wan Changxuan. Dual Fine-Granularity POI Recommendation on Location-Based Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2600-2610. DOI: 10.7544/issn1000-1239.2017.20160502
    [6]Tan Zhenhua, Shi Yingcheng, Shi Nanxiang, Yang Guangming, Wang Xingwei. Rumor Propagation Analysis Model Inspired by Gravity Theory for Online Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2586-2599. DOI: 10.7544/issn1000-1239.2017.20160434
    [7]Wang Zhenwen, Xiao Weidong, and Tan Wentang. Classification in Networked Data Based on the Probability Generative Model[J]. Journal of Computer Research and Development, 2013, 50(12): 2642-2650.
    [8]Tan Wentang, Wang Zhenwen, Yin Fengjing, Ge Bin, and Xiao Weidong. A Partial Comparative Cross Collections LDA Model[J]. Journal of Computer Research and Development, 2013, 50(9): 1943-1953.
    [9]Guo Qiaojin, Li Ning, Yang Yubin, and Wu Gangshan. LDA-CRF: Object Detection Based on Graphical Model[J]. Journal of Computer Research and Development, 2012, 49(11): 2296-2304.
    [10]Li Zhi, Li Qianmu, Zhang Hong, Liu Fengyu. Closely Social Circuit Based Routing in Social Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1185-1195.

Catalog

    Article views (803) PDF downloads (520) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return