Efficient Democratic Group Signatures with Threshold Traceability
Efficient Democratic Group Signatures with Threshold Traceability
HE Guo-feng 1(何国锋), LI Xiang-xue 2(李祥学), LI Qiang 3(李 强), ZHENG Dong 3(郑 东)
(1. Department of Electronic Engineering, Shanghai Jiaotong University,
Shanghai 200240, China;
2. Department of Computer Science and Technology,
East China Normal University, Shanghai 200241, China;
3. School of
Information Security Engineering, Shanghai Jiaotong University, Shanghai
200240, China)
(1. Department of Electronic Engineering, Shanghai Jiaotong University,
Shanghai 200240, China;
2. Department of Computer Science and Technology,
East China Normal University, Shanghai 200241, China;
3. School of
Information Security Engineering, Shanghai Jiaotong University, Shanghai
200240, China)
Contact:
HE Guo-feng 1(何国锋)
E-mail:heguofeng@shtel.com.cn
Supported by:
the National Natural Science of Foundation of China (Nos.61070249, 60970111 and 60873217), and the National High Technology Research and Development Program(863) of China (No.2008AAZ403)
HE Guo-feng 1(何国锋), LI Xiang-xue 2(李祥学), LI Qiang 3(李 强), ZHENG Dong 3(郑 东). Efficient Democratic Group Signatures with Threshold Traceability[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 530-532.
[1] Chaum D, Heyst E. Group signatures [C] // Proc Advances in Cryptology, EUROCRYPT 1991. Brighton, UK:Springer-Verlag, 1991: 257-265.[2] Rivest R L, Shamir A, Tauman Y. How to leak a secret [C] // Proc Advances in Cryptology, ASIACRYPT 2001. Queensland,Australia: Springer-Verlag, 2001: 552-565.[3] Manulis M. Democratic group signature on example of joint ventures [C] // Proc ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006. Taipei: ACM Press, 2006: 365.[4] Manulis M, Sadeghi A, Schwenk J. Linkable democratic groupsignatures [C] // Proc Security Practice and Experience, ISPEC 2006. Shanghai, China: Springer-Verlag, 2006: 187-201.[5] Schoenmakers B. A simple publicly verifiable secret sharing scheme andits application to electronic voting [C] // Proc Advances in Cryptology, CRYPTO 1999. California, USA:Springer-Verlag, 1999: 148-164.[6] Stadler M. Publicly verifiable secret sharing [C] // Proc Advances in Cryptology, EUROCRYPT 1996. Saragossa, Spain:Springer-Verlag, 1996: 190-199.[7] Li Xiang-xue, Qian Hai-feng, Li Jian-hua. Democratic group signatureswith threshold traceability [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14(1): 98-101.[8] Bresson E, Stern J. Proofs of knowledge for non-monotone discrete-logformulae and applications [C]// Proc 5th Information Security, ISC2002. Sao Paulo, Brazil: Springer-Verlag,2002: 272-288.