Jing-Liang Zhang, Yu-Min Wang. Efficient Membership Revocation in ACJT Group Signature[J]. Journal of Electronic Science and Technology, 2008, 6(1): 39-42.
Citation: Jing-Liang Zhang, Yu-Min Wang. Efficient Membership Revocation in ACJT Group Signature[J]. Journal of Electronic Science and Technology, 2008, 6(1): 39-42.

Efficient Membership Revocation in ACJT Group Signature

Funds: 

This work was supported in part by the National Nature Science Foundation of China under Grant No. 60473027.

More Information
  • Author Bio:

    Jing-Liang Zhang research interests include cryptography and its applications, zjlmlz@yahoo.com.cn;
    Yu-Min Wang, ymwang@xidian.edu.cn

    Jing-Liang Zhang research interests include cryptography and its applications, zjlmlz@yahoo.com.cn;
    Yu-Min Wang, ymwang@xidian.edu.cn

  • Received Date: 2007-07-22
  • Rev Recd Date: 2007-10-07
  • Publish Date: 2008-03-24
  • How to find efficient and secure membership revocation algorithms is one of the most important issues standing in the way of real-world applications of group signatures. In this paper, the proof of knowledge of divisibility is given and a novel membership revocation method in ACJT group signature scheme is proposed:the group manager issues the product E of the public keys of current members in the group, when a group member wants to sign, he should not only proves that he has a membership certificate, but also proves that the public key in his certificate divides exactly the public key product E with zero knowledge. The proposed method is efficient since the group manager only needs one division and one exponentiation when a group member is deleted, while the signing and verifying procedure are independent of the number of current group members and excluded members, as well as the original group public key and membership certificates needn't be changed.
  • Related Articles

    [1]Guo-Bin Zhu, Hu Xiong, Zhi-Guang Qin. Pairing-Free ID-Based Key-Insulated Signature Scheme[J]. Journal of Electronic Science and Technology, 2015, 13(1): 33-38. DOI: 10.3969/j.issn.1674-862X.2015.01.007
    [2]Laila Y. Fannas, Ahmed Y. Ben Sasi. Off-Line Signature Recognition Based on Angle Features and Artificial Neural Network Algorithm[J]. Journal of Electronic Science and Technology, 2014, 12(1): 85-89. DOI: 10.3969/j.issn.1674-862X.2014.01.017
    [3]Cheng Guo, Chin-Chen Chang. Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem[J]. Journal of Electronic Science and Technology, 2012, 10(3): 250-255. DOI: 10.3969/j.issn.1674-862X.2012.03.010
    [4]Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu, Yuan-Yu Tsai, Chi-Shiang Chan. Efficient Certificateless Aggregate Signature Scheme[J]. Journal of Electronic Science and Technology, 2012, 10(3): 209-214. DOI: 10.3969/j.issn.1674-862X.2012.03.004
    [5]Ke Tang, Ming-Tian Zhou, Zhi-Hong Zuo. An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection[J]. Journal of Electronic Science and Technology, 2010, 8(2): 114-121. DOI: 10.3969/j.issn.1674-862X.2010.02.004
    [6]WEI Jiang, TOIVONEN Marja. Knowledge-intensive Business Services in National Innovation Systems[J]. Journal of Electronic Science and Technology, 2006, 4(4): 417-423.
    [7]LIU Ju, LI Yong-jian. An Analysis of Knowledge Sharing Approaches for Emerging-technology-based Strategic Alliances in Electronic Industry[J]. Journal of Electronic Science and Technology, 2006, 4(4): 364-368.
    [8]BRINK Johan, MCKELVEY Maureen. On the Relationship between the Evolution of Technological Firms and Their Knowledge Development Regimes[J]. Journal of Electronic Science and Technology, 2006, 4(4): 289-298.
    [9]SENOO Dai. Knowledge Creation Systems in Seven-Eleven Japan[J]. Journal of Electronic Science and Technology, 2004, 2(3): 92-97.
    [10]KIM Jongwoo, LEE Hongjoo, PARK Sungjoo. Intelligent Knowledge Recommendation Methods for R&D Knowledge Portals[J]. Journal of Electronic Science and Technology, 2004, 2(3): 80-85,91.
  • Catalog

      Article Metrics

      Article views (353) PDF downloads (37) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return