Xiangguo Cheng, Lifeng Guo, Jia Yu, Huiran Ma, and Yuexiu Wu
[1] A. Shamir, Identity-based cryptosystems and signature schemes, Proc. Crypto 1984, LNCS 196, Springer-Verlag,1984, 47–53. [2] D. Chaum and E. van Heyst, Group signatures, Proc. Eurocrypt 1991, LNCS 547, Springer-Verlag, 1991, 257–265. [3] G. Ateniese and B. de Medeiros, Efficient group signatures without trapdoors, Proc. Asiacrypt 2003, LNCS 2894, Springer-Verlag, 2003, 246–268. [4] X. Cheng, C. Yang, and J. Yu, a new approach to group signature schemes, Journal of Computers, 6(4), 2011, 812–817. [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, Proc. Crypto 2000, LNCS 1880, Springer-Verlag, 2000, 255–270. [6] J. Camenisch and M. Stadler, Efficient and generalized group signatures, Proc. Eurocrypt 1997, LNCS 1233, Springer-Verlag, 1997, 465–479. [7] L. Chen and T.P. Pedersen, New group signature schemes, Proc. Eurocrypt 1994, LNCS 950, Springer-Verlag, 1994, 171–181. [8] J. Camenisch and M. Stadler, Efficient group signature schemes for large groups, Proc. Crypto 1997, LNCS 1296, Springer-Verlag, 1997, 410–424. [9] J. Camenisch and M. Michels, A group signature scheme with improved efficiency, Proc. Asiacrypt 1998, LNCS 1514, Springer-Verlag, 1998, 160–174. [10] J. Camenisch and M. Michels, Separability and efficiency for generic group signature schemes, Proc. Crypto 1999, LNCS 1666, Springer-Verlag, 1999, 413–430. [11] M. Bellare, D. Micciancio, and B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, Proc. Eurocrypt 2003, LNCS 2656, Springer-Verlag, 2003, 614–629. [12] D. Boneh, X. Boyen, and H. Shacham, Short group signatures, Proc. Crypto 2004, LNCS 3152, Springer-Verlag, 2004, 41–55. [13] M. Bellare, H. Shi, and C. Zhang, Foundations of group signatures: The case of dynamic groups, Proc. CT-RSA 2005, LNCS 3376, Springer-Verlag, 2005, 136–153. [14] L. Nguyen and R. Safavi-Naini, Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings, Proc. Asiacrypt 2004, LNCS 3329, Springer-Verlag, 2004, 372–386. [15] S. Park, S. Kim, and D. Won, ID-based group signature, Electronics Letters, 33(19), 1998, 1616–1617. [16] Y. Tseng and J. Jan, A novel ID-based group signature, Proc. International computer symposium, workshop on cryptology and information security, 1998, 159–164. [17] X. Chen, F. Zhang, and K. Kim, A new ID-based group signature scheme from bilinear pairings, Cryptology ePrint Archive, Report 2002/184, 2002, http://eprint.iacr.org. [18] V.K. Wei, T.H. Yuen, and F. Zhang, Group signature where group manager, members and open authority are identity-based, Proc. Information Security and Privacy (ACISP 2005), LNCS 3574, Springer-Verlag, 2005, 468–480. [19] W. Mao and C.H. Lim, Cryptanalysis in prime order subgroup of Zn, Proc. Asiacrypt 1998, LNCS 1514, Springer-Verlag, 1998, 214–226. [20] M. Joye, S. Kim, and N. Lee, Cryptanalysis of two group signature schemes, Proc. Information Security 1999, LNCS 1729, Springer- Verlag, 1999, 271–275. [21] M. Joye, On the difficulty coalition-resistance in group signature schemes, Technique Report, LCIS-99-6B, 1999. [22] X. Cheng, H. Zhu, Y. Qiu, and X. Wang, Efficient group signatures from bilinear pairing, Proc. CISC 2005, LNCS 3822, Springer-Verlag, 2005, 128–139. [23] S. Cui, X. Cheng, and C.W. Chan, Practical group signatures from RSA, Proc. 20th International Conf. on Advanced Information Networking and Applications (AINA’06), IEEE Computer Society Press, 2006, 111–115. [24] X. Yi, An identity-based signature scheme from the Weil pairing, IEEE Communications Letters, 7(2), 2004, 76–78. [25] X. Cheng, J. Liu, and X. Wang, An identity-based signature and its threshold version, Proc. 19th International Conf. on Advanced Information Networking and Applications (AINA’05), IEEE Computer Society Press, 2005, 973–977.
Important Links:
Go Back