Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
A Group Signature Scheme Committing the Group
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Separability and Efficiency for Generic Group Signature Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Dynamic Group Signature with Forward Security and Its Application
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
On the efficiency of group signatures providing information-theoretic anonymity
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A new (t, n)-threshold multi-secret sharing scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
Analyses were made on the basic principles of group signature and HCC (hyper-elliptic curves cryptosystem); as to the security problems and system weakness of present group signature schemes, we presented an improved group signature scheme based on HCC. By blinding identity of group members and generating identity certificate for each member, the scheme reduces the complexity in group managing and signature generating, avoids the connection between public key and signature length with group scale. The scheme makes full use of the superiority of HCC, such as high efficiency, short key length and etc, and the scheme greatly improves the efficiency of hardware and software application. As for scheme analyzing, we present two signature forgery algorithms against this scheme by group manager and group members, and prove that the difficulty in signature forging is equivalent to HCDLP (hyperelliptic curves discrete logarithm problem).