A NEW IDENTITY-BASED GROUP SIGNATURE SCHEME

Xiangguo Cheng, Lifeng Guo, Jia Yu, Huiran Ma, and Yuexiu Wu

References

  1. [1] A. Shamir, Identity-based cryptosystems and signature schemes, Proc. Crypto 1984, LNCS 196, Springer-Verlag,1984, 47–53.
  2. [2] D. Chaum and E. van Heyst, Group signatures, Proc. Eurocrypt 1991, LNCS 547, Springer-Verlag, 1991, 257–265.
  3. [3] G. Ateniese and B. de Medeiros, Efficient group signatures without trapdoors, Proc. Asiacrypt 2003, LNCS 2894, Springer-Verlag, 2003, 246–268.
  4. [4] X. Cheng, C. Yang, and J. Yu, a new approach to group signature schemes, Journal of Computers, 6(4), 2011, 812–817.
  5. [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, Proc. Crypto 2000, LNCS 1880, Springer-Verlag, 2000, 255–270.
  6. [6] J. Camenisch and M. Stadler, Efficient and generalized group signatures, Proc. Eurocrypt 1997, LNCS 1233, Springer-Verlag, 1997, 465–479.
  7. [7] L. Chen and T.P. Pedersen, New group signature schemes, Proc. Eurocrypt 1994, LNCS 950, Springer-Verlag, 1994, 171–181.
  8. [8] J. Camenisch and M. Stadler, Efficient group signature schemes for large groups, Proc. Crypto 1997, LNCS 1296, Springer-Verlag, 1997, 410–424.
  9. [9] J. Camenisch and M. Michels, A group signature scheme with improved efficiency, Proc. Asiacrypt 1998, LNCS 1514, Springer-Verlag, 1998, 160–174.
  10. [10] J. Camenisch and M. Michels, Separability and efficiency for generic group signature schemes, Proc. Crypto 1999, LNCS 1666, Springer-Verlag, 1999, 413–430.
  11. [11] M. Bellare, D. Micciancio, and B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, Proc. Eurocrypt 2003, LNCS 2656, Springer-Verlag, 2003, 614–629.
  12. [12] D. Boneh, X. Boyen, and H. Shacham, Short group signatures, Proc. Crypto 2004, LNCS 3152, Springer-Verlag, 2004, 41–55.
  13. [13] M. Bellare, H. Shi, and C. Zhang, Foundations of group signatures: The case of dynamic groups, Proc. CT-RSA 2005, LNCS 3376, Springer-Verlag, 2005, 136–153.
  14. [14] L. Nguyen and R. Safavi-Naini, Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings, Proc. Asiacrypt 2004, LNCS 3329, Springer-Verlag, 2004, 372–386.
  15. [15] S. Park, S. Kim, and D. Won, ID-based group signature, Electronics Letters, 33(19), 1998, 1616–1617.
  16. [16] Y. Tseng and J. Jan, A novel ID-based group signature, Proc. International computer symposium, workshop on cryptology and information security, 1998, 159–164.
  17. [17] X. Chen, F. Zhang, and K. Kim, A new ID-based group signature scheme from bilinear pairings, Cryptology ePrint Archive, Report 2002/184, 2002, http://eprint.iacr.org.
  18. [18] V.K. Wei, T.H. Yuen, and F. Zhang, Group signature where group manager, members and open authority are identity-based, Proc. Information Security and Privacy (ACISP 2005), LNCS 3574, Springer-Verlag, 2005, 468–480.
  19. [19] W. Mao and C.H. Lim, Cryptanalysis in prime order subgroup of Zn, Proc. Asiacrypt 1998, LNCS 1514, Springer-Verlag, 1998, 214–226.
  20. [20] M. Joye, S. Kim, and N. Lee, Cryptanalysis of two group signature schemes, Proc. Information Security 1999, LNCS 1729, Springer- Verlag, 1999, 271–275.
  21. [21] M. Joye, On the difficulty coalition-resistance in group signature schemes, Technique Report, LCIS-99-6B, 1999.
  22. [22] X. Cheng, H. Zhu, Y. Qiu, and X. Wang, Efficient group signatures from bilinear pairing, Proc. CISC 2005, LNCS 3822, Springer-Verlag, 2005, 128–139.
  23. [23] S. Cui, X. Cheng, and C.W. Chan, Practical group signatures from RSA, Proc. 20th International Conf. on Advanced Information Networking and Applications (AINA’06), IEEE Computer Society Press, 2006, 111–115.
  24. [24] X. Yi, An identity-based signature scheme from the Weil pairing, IEEE Communications Letters, 7(2), 2004, 76–78.
  25. [25] X. Cheng, J. Liu, and X. Wang, An identity-based signature and its threshold version, Proc. 19th International Conf. on Advanced Information Networking and Applications (AINA’05), IEEE Computer Society Press, 2005, 973–977.

Important Links:

Go Back