Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Full Text (PDF, 121KB), PP.16-22

Views: 0 Downloads: 0

Author(s)

Jianhua Zhu 1,* Guohua Cui 1 Shiyang Zhou 1

1. College of Computer Science & Technology, HuaZhong University of Science & Technology, WuHan, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2009.01.03

Received: 14 Feb. 2009 / Revised: 23 May 2009 / Accepted: 1 Aug. 2009 / Published: 8 Oct. 2009

Index Terms

Group signature, forward security, member revocation, ahead signature, threshold

Abstract

A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes. These schemes have forward security which minimizes the damage caused by the exposure of any group member's signing key, and does not affect the past signatures generated by this member; meanwhile, ahead signature generated by a group member before the joining date can be prevented via this strategy. Moreover, this scheme support the group member revocable function efficiently and further has no requirement for time period limits.

Cite This Paper

Jianhua Zhu, Guohua Cui, Shiyang Zhou, "Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings", International Journal of Information Technology and Computer Science(IJITCS), vol.1, no.1, pp.16-22, 2009. DOI: 10.5815/ijitcs.2009.01.03

Reference

[1] D. Chaum, E. van Heyst, Group signatures. In Advances in Cryptology-EuroCrypt’91 , Lecture Notes in Computer Science 547, Springer-Verlag, 1991,pp, 257–265.

[2] J. CAMENISH, M. STADLER, Efficient group signatures for large groups, Proceedings of CRYPTO’97, Lecture Notes in Computer Science 1296, Springer-Verlag, 1997, pp.410–424.

[3] J.CAMENISH, M.A.MICHELS, group signature scheme with improved efficiency, Proceedings of ASIACRYPT’98, Lecture Notes in Computer Science 1541, Springer-Verlag, 1998 , pp,160–174.

[4] G. ATENIESE, G. TSUDIK, A coalition-resistant group signature[EBOL]. http : www.isi.edu/∥~gts/pubs.html.

[5] G. ATENIESE, G. TSUDIK. Some open issues and new directions in group signatures, Financial Cryptography (FC’99), LNCS 1648, Springer-Verlag, 1999, pp,196–211.

[6] R. Anderson, Invited lecture. In : Proceedings of the 4th ACM Conference on Computer and Communications Security , Zurich , Switzerland , 1997 ,pp, 1–7.

[7] D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, C Boyd ( Ed. ), In Asiacrypt’01, Gold Coast , Australia :Springer-Verlag , 2001, pp, 514–532.

[8] D. Boneh, X. Boyen, Short signatures without random oracles, Christian Cachin, Jan Camenisch (Eds.), Eurocrypt’04, Interlaken, Switzerland, Springer-Verlag, 2004, pp,56–73.

[9] D.L. Vo, K. Kim, Yet Another Forward Secure Signature from Bilinear Pairings. ICISC 2005, LNCS 3935, Springer-Verlag, Berlin Heidelberg , 2006, pp.441–455. Science & Te

[10] Z. Wang, H.Y. Chen, A practical Identity-Based Signature Scheme from Bilinear. EUC Workshops 2007, LNCS 4809, 2007, pp, 704–715.

[11] D.X. Song, Practical forward secure group signature schemes, Proc of the 8th ACM Conf on Computer and Communications Security ( CCS 2001 ), New York : ACM Press , 2001, pp,225–234.

[12] S.Z. Chen, D.X. Li, An efficient revocable group signature schemes with forward security [J]. Chinese Journal of Computers , 2006 , 29 (6) :pp, 998–1003.

[13] R.P.Li, J. Yu and G.W. Li, and D.X. Li, Forward Secure Group Signature Schemes with Efficient Revocation, Journal of Computer Research and Development, 2007, 44 (7) : pp,1219–1226.

[14] X.M.Wang, F.W.Fu and G.Z.Zhan, A Forward Secure Multisignature Scheme, Chinese Journal of Computers , 2004 , 27 (9) , pp,1177–1191.

[15] X. Cheng, H. Zhu, Y. Qiu, and X. Wang, Efficient Group signatures from Bilinear Pairing, CISC’05 LNCS 3822, Springer-Verlag, 2005, pp.128–139.

[16] H. Park, H.Kim, K. Chun, and J. Lee, Untraceability of Group Signature Scheme based on Bilinear Pairing and their Improvement, International Conference on Information Technology(ITNG’07) IEEE, 2007, pp,103–109.

[17] Y. Desmedt, Y. Frankel. Threshold cryptosystems. In:Brassard G ed. A dvances in Cryptology, CRYPTO’89 Proceedings. LNCS 435, Berlin: Springer-Verlag, 1990, 307–315.

[18] C.B.Ma,D.K.He, A New Chameleon Threshold Signature Based on Bilinear Pairing. Journal of Computer Research and Developmnt, 2005,42(8): 1427–1430.

[19] F.Xiao,F. G.Chen, D.Y.Zhang. New ID-based Threshhold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004,LNCS 3348, 371–383.

[20] H.X.Peng,D.G.Feng. A Forward Secure Threshold Signature Scheme from Bilinear Pairing. Journal of Computer Research and Development,2007,44(4): 574–580.