• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Rupeng, Yu Jia, Li Guowen, Li Daxing. Forward Secure Group Signature Schemes with Efficient Revocation[J]. Journal of Computer Research and Development, 2007, 44(7): 1219-1226.
Citation: Li Rupeng, Yu Jia, Li Guowen, Li Daxing. Forward Secure Group Signature Schemes with Efficient Revocation[J]. Journal of Computer Research and Development, 2007, 44(7): 1219-1226.

Forward Secure Group Signature Schemes with Efficient Revocation

More Information
  • Published Date: July 14, 2007
  • How to efficiently revoke group membership and how to cope with key exposure are two important issues in designing group signature schemes. Up to now, there are few group schemes that can resolve the two problems at the same time. The common drawback of the previously proposed scheme is that the computational cost of verifying linearly depends on the number of the revoked group members. The revocation method based on accumulator has common drawback: previously signed signatures can not pass the verifying algorithm under the updated public value after the signer is revoked. Based on the ACJT group signature scheme, two new group signature schemes are proposed. The main trait is that they have efficiently revocable property and forward secure property at the same time. The evolution of secret key in scheme Ⅰ is more efficient. But the size of group public key and the computational cost of signing and verifying in scheme Ⅰ linearly depend on the number of time periods. Scheme Ⅱ adopts another forward secure method and overcomes this defect. Both the schemes tackle the drawback of the revocation method based on accumulator and support retroactively publicly revocable group membership with backward unlinkability. The computational cost of signing and verifying is independent of the number of the current group members and the revoked group members.
  • Related Articles

    [1]Fan Wei, Liu Yong. Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer[J]. Journal of Computer Research and Development, 2022, 59(8): 1757-1769. DOI: 10.7544/issn1000-1239.20220064
    [2]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [3]Xu Mingda, Zhang Zike, Xu Xiaoke. Research on Spreading Mechanism of False Information in Social Networks by Motif Degree[J]. Journal of Computer Research and Development, 2021, 58(7): 1425-1435. DOI: 10.7544/issn1000-1239.2021.20200806
    [4]Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155
    [5]Liao Guoqiong, Jiang Shan, Zhou Zhiheng, Wan Changxuan. Dual Fine-Granularity POI Recommendation on Location-Based Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2600-2610. DOI: 10.7544/issn1000-1239.2017.20160502
    [6]Tan Zhenhua, Shi Yingcheng, Shi Nanxiang, Yang Guangming, Wang Xingwei. Rumor Propagation Analysis Model Inspired by Gravity Theory for Online Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2586-2599. DOI: 10.7544/issn1000-1239.2017.20160434
    [7]Wang Zhenwen, Xiao Weidong, and Tan Wentang. Classification in Networked Data Based on the Probability Generative Model[J]. Journal of Computer Research and Development, 2013, 50(12): 2642-2650.
    [8]Tan Wentang, Wang Zhenwen, Yin Fengjing, Ge Bin, and Xiao Weidong. A Partial Comparative Cross Collections LDA Model[J]. Journal of Computer Research and Development, 2013, 50(9): 1943-1953.
    [9]Guo Qiaojin, Li Ning, Yang Yubin, and Wu Gangshan. LDA-CRF: Object Detection Based on Graphical Model[J]. Journal of Computer Research and Development, 2012, 49(11): 2296-2304.
    [10]Li Zhi, Li Qianmu, Zhang Hong, Liu Fengyu. Closely Social Circuit Based Routing in Social Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1185-1195.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return