• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
Citation: Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.

A Kind of Group Signature Scheme with Authorization

More Information
  • Published Date: May 14, 2007
  • Group signature has a wide application in the field of electronic business and politics. Lots of variant group signature schemes have been invented in the last 15 years. Among them, some research papers are about the group signature itself, which means that new group signature schemes are to be constructed based on find new intractable assumptions; some papers are about the combination of blind signature and group signature, called group blind signature schemes; some papers are about the combination of forward secure signature and group signature, called forward secure group signature schemes. But there is no research papers about the group signature scheme with authorization. In this paper, a new kind of group signature scheme with authorization is constructed based on the BMW's scheme, which is a group signature scheme whose security is based on the standard assumption. Compared with BMW's scheme: Adding authorization generation algorithm to key generation algorithm in group signature scheme, although the speed of instance production of group signature scheme slows down, strengthens group signature scheme with authorization characteristic, which promotes group signature application in electronic business and electronic politics; and furthermore, the proof of theorem 2 in this paper is simpler than that of BMW's scheme.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330744
    [2]Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development, 2024, 61(6): 1525-1535. DOI: 10.7544/issn1000-1239.202330092
    [3]Tang Yongli, Li Ying, Zhao Zongqu, Li Xingyu, Wang Hanbo. Traceable Anonymous Single Sign on Scheme on Lattice[J]. Journal of Computer Research and Development, 2023, 60(6): 1417-1430. DOI: 10.7544/issn1000-1239.202111235
    [4]Hou Huiying, Lian Huanhuan, Zhao Yunlei. An Efficient and Traceable Anonymous VANET Communication Scheme for Autonomous Driving[J]. Journal of Computer Research and Development, 2022, 59(4): 894-906. DOI: 10.7544/issn1000-1239.20200915
    [5]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [6]Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu. An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079. DOI: 10.7544/issn1000-1239.2020.20190307
    [7]Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198. DOI: 10.7544/issn1000-1239.2018.20180430
    [8]Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    [9]Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei. Cryptanalysis and Modification of a Traitor Tracing Scheme[J]. Journal of Computer Research and Development, 2013, 50(10): 2092-2099.
    [10]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.

Catalog

    Article views (622) PDF downloads (656) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return