Group Signature Member Deletion Scheme Based on Discrete Logarithm and Factorization

被引:0
|
作者
Yao, Junping [1 ]
Li, Xinshe [1 ]
Li, Yuan [1 ]
Zeng, Jingjing [1 ]
机构
[1] High Technol Inst, Xian, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been proven to be unsafe to make the deleted member fail to pass the group signature and make the legal member implement the scheme of valid signature through updating operator scheme. Then the secret property key updating of legal member cannot be accomplished by each legal member. In this paper, a new secret property key updating operator is designed, whose work of updating the group member secret property key is done by group administrator. Its security is based on the discrete logarithm and factorization difficulty, which is resistant to collusion attacks.
引用
收藏
页码:196 / 203
页数:8
相关论文
共 50 条
  • [41] An efficient identification scheme based on discrete logarithm assumption
    Zhong, M.
    Yang, Y.-X.
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 2001, 24 (01): : 52 - 55
  • [42] A Digital Signature System Based on Discrete Logarithm in Mobile Payment
    Zhao Zongqu
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 84 - 86
  • [43] Digital signature with message recovery based on factoring and discrete logarithm
    Hwang, Min-Shiang
    Chen, Shih-Ming
    Liu, Chi-Yu
    IETE JOURNAL OF RESEARCH, 2016, 62 (03) : 415 - 423
  • [44] An improved discrete logarithm-based multisignature scheme
    Wang, Lian Jie
    Chen, Jonathan Jen-Rong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) : 969 - 973
  • [45] Directed user authentication scheme based on discrete logarithm
    Tang, Shaohua
    Ma, Weihua
    Journal of Circuits, Systems and Computers, 9 (5-6): : 299 - 306
  • [46] Efficient identification scheme based on discrete logarithm assumption
    Zhong, M.
    Yang, Y.X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2001, 24 (01): : 52 - 55
  • [47] Directed user authentication scheme based on discrete logarithm
    Tang, SH
    Ma, WH
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (5-6) : 299 - 306
  • [48] A new blind signature based on the discrete logarithm problem for untraceability
    Lee, CC
    Hwang, MS
    Yang, WP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (03) : 837 - 841
  • [49] Blind collective signature protocol based on Discrete logarithm problem
    Moldovyan, Nikolay A.
    Moldovyan, Alexander A.
    International Journal of Network Security, 2010, 11 (02) : 106 - 113
  • [50] Untraceable blind signature schemes based on discrete logarithm problem
    Lee, CC
    Yang, WP
    Hwang, MS
    FUNDAMENTA INFORMATICAE, 2003, 55 (3-4) : 307 - 320