Efficient Member Revocation in Group Signature Schemes

Author(s):  
Eun Young Choi ◽  
Hyun-Jeong Kim ◽  
Dong Hoon Lee
2012 ◽  
Vol 21 (4) ◽  
pp. 648-658
Author(s):  
R. Duran Diaz ◽  
L. Hernandez Encinas ◽  
J. Munoz Masque

2020 ◽  
Vol 66 (9) ◽  
pp. 5754-5773 ◽  
Author(s):  
Martianus Frederic Ezerman ◽  
Hyung Tae Lee ◽  
San Ling ◽  
Khoa Nguyen ◽  
Huaxiong Wang

2011 ◽  
Vol 6 (4) ◽  
Author(s):  
Xiangguo Cheng ◽  
Chen Yang ◽  
Jia Yu

Author(s):  
Nedal Tahat ◽  
Ashraf A. Tahat

We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an improved level of security relative to an individual hard problem. The majority of the denoted IBTHS techniques are established on an individual difficult problem. Despite the fact that these methods are secure, however, a prospective solution of this sole problem by an adversary will enable him/her to recover the entire private data together with secret keys and configuration values of the associated scheme. Our technique is immune to the four most familiar attack types in relation to the signature schemes. Enhanced performance of our proposed technique is verified in terms of minimum cost of computations required by both of the signing algorithm and the verifying algorithm in addition to immunity to attacks.


Sign in / Sign up

Export Citation Format

Share Document