A Novel Scheme for Deleting Group Members

Abstract

Deleting group members safely and efficiently has been a hot research issue in the field of the group signature. Some resolutions have been proposed by cryptography experts, but in some way, problems like loophole and low efficiency have been confusing us in the research. To solve the problem, the writers try to give a new secret key updating algorithm based on improving Wang Shangping’s group members deleting scheme, and analyze the safety and efficiency of implemen- tation systematically in the paper.

Share and Cite:

Yao, J. , Li, X. and Ma, J. (2014) A Novel Scheme for Deleting Group Members. Journal of Computer and Communications, 2, 39-42. doi: 10.4236/jcc.2014.24006.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Chaum, D. and Van Heyst, E. (1991) Group Signatures. In: Advances in Cryptology EUROCRYPT’91. LNCS 547, Springer-Verlag, Berlin, 257-265.
[2] Camenisch, J. and Stadler, M. (1997) Effient Group Signature Schemes for Large Groups. Proceedings of CRYPT’97, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 410-424.
[3] Bresson, E. and Stern, J. (1999) Efficient Revocation in Group Signature. In: Kim, K., Ed., PKC2001, LNCS1992, Springer-Verlag, Berlin, 190-206.
[4] Wang, S.P., Wang, Y.M. and Wang, X. (2003) A New Solution Scheme for the Member Deletion Problem in Group Signature by Use of Renew Operator. Journal of Software, 14, 1911-1917.
[5] Li, X.S. and Hu, Y.P. (2008) Analysis and Improvement for a Group Signature Member Deletion Scheme. Journal of Xidian University, 35, 478-482.
[6] Huang, Z.J. and Lin, X.Z. (2005) A Group Member Deletion Scheme Cryptanalysis. Journal of Software, 16.
[7] Ateniese, G. and Medeiros, B.D. (2003) Efficient Group Signatures without Trapdoors. In: Advances of ASIACRYPT’03. LNCS2894, Springer-Verlag, Berlin, 246-268.
[8] Chow, S.S.M. (2009) Blind Signature and Ring Signature Schemes: Rehabilitation and Attack. Computer Standards & Interfaces, 31, 707-712.
[9] Zhang, J.H., Chen, H. and Qin, G. (2009) Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme. Proceedings of the 2009 2nd International Congress on Image and Signal Processing (CISP), 5.
[10] Zhao, W., Lin, C. and Ye, D.F. (2009) Provably Secure Convertible Nominative Signature Scheme. Information Security and Cryptology 4th International Conference, Revised Selected Papers, 23-40.
[11] Zhang, J.H. and Qin, G. (2008) On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. 2008 International Conference on Networking, Architecture, and Storage (NAS), June 2008, 351-358.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.