An efficient full dynamic group signature scheme over ring
نویسندگان
چکیده
منابع مشابه
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves
Considering such a scenario: Several network policemen consist of a group NP in a network; Every one of them can find out what kind of documents are harmful and then sign them. Any user in this network who receives the above documents would check whether a signature exists on the documents and also it is validly signed by the group NP. And then, this user can be convinced the document is really...
متن کاملAn Efficient Id-based Group Signature Scheme
We present an efficient group signature scheme which make use of elliptic curves identity-based signature scheme. The performance of the generated group signature scheme is similar to the performance of the underlying ID-based signature scheme.
متن کاملEfficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official claimed that he was the anonymous source. Nevertheless, some are still inconvinced. In this paper, we introduce a new notion of identity-committable signatures (ICS) to ensure the anonymity of “Deep Throat” inside a group. A ...
متن کاملAn Efficient Group Signature Scheme from Bilinear Maps
We propose a new group signature scheme which is secure if we assume the Decision Diffie-Hellman assumption, the q-Strong Diffie-Hellman assumption, and the existence of random oracles. The proposed scheme is the most efficient among the all previous group signature schemes in signature length and in computational complexity. This paper is the full version of the extended abstract appeared in A...
متن کاملRepairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the proposed scheme can use short secret key and reduces the load of signature verification. However, in this paper we find that there are many ambiguities in the proposed scheme. The verifiers cannot verify valid signatures, wh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity
سال: 2019
ISSN: 2523-3246
DOI: 10.1186/s42400-019-0037-8