File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Group signature where group manager, members and Open Authority are identity-based
Title | Group signature where group manager, members and Open Authority are identity-based |
---|---|
Authors | |
Issue Date | 2005 |
Citation | Lecture Notes in Computer Science, 2005, v. 3574, p. 468-480 How to Cite? |
Abstract | We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all identity-based. We use the security model of Bellare, Shi, and Zhang [3], except to add three identity managers for manager, members, and OA respectively, and we discard the Open Oracle (OO). Our construction uses identity-based signatures summarized in Bellare, Namprempre, and Neven [2] for manager, Boneh and Franklin's IBE [7] for OA, and we extend Bellare et al.[3]'s group signature construction by verifiably encrypt an image of the member public key, instead of the public key itself. The last innovation is crucial in our efficiency; otherwise, Camenisch and Damgard[9]'s verifiable encryption would have to be used resulting in lower efficiency. © Springer-Verlag Berlin Heidelberg 2005. |
Persistent Identifier | http://hdl.handle.net/10722/260245 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wei, Victor K. | - |
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Zhang, Fangguo | - |
dc.date.accessioned | 2018-09-12T02:00:53Z | - |
dc.date.available | 2018-09-12T02:00:53Z | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | Lecture Notes in Computer Science, 2005, v. 3574, p. 468-480 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260245 | - |
dc.description.abstract | We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all identity-based. We use the security model of Bellare, Shi, and Zhang [3], except to add three identity managers for manager, members, and OA respectively, and we discard the Open Oracle (OO). Our construction uses identity-based signatures summarized in Bellare, Namprempre, and Neven [2] for manager, Boneh and Franklin's IBE [7] for OA, and we extend Bellare et al.[3]'s group signature construction by verifiably encrypt an image of the member public key, instead of the public key itself. The last innovation is crucial in our efficiency; otherwise, Camenisch and Damgard[9]'s verifiable encryption would have to be used resulting in lower efficiency. © Springer-Verlag Berlin Heidelberg 2005. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science | - |
dc.title | Group signature where group manager, members and Open Authority are identity-based | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-26444440344 | - |
dc.identifier.volume | 3574 | - |
dc.identifier.spage | 468 | - |
dc.identifier.epage | 480 | - |
dc.identifier.issnl | 0302-9743 | - |