Netinfo Security ›› 2017, Vol. 17 ›› Issue (3): 53-58.doi: 10.3969/j.issn.1671-1122.2017.03.009

• Orginal Article • Previous Articles     Next Articles

Research on Certificateless Group Signature Scheme Based on Bilinear Pairings

Yameng CHEN1, Xiangguo CHENG2(), Shuo WANG2, Ming GAO2   

  1. 1.College of Data Science and Software Engineering, Qingdao University, Qingdao Shandong 266071, China
    2. College of Computer Science and Technology, Qingdao University, Qingdao Shandong 266071, China
  • Received:2016-11-16 Online:2017-03-20 Published:2020-05-12

Abstract:

Certificateless cryptography not only solves the certificate management problem in the traditional public key cryptography, but also overcomes the key escrow problem in identity-based cryptography. On the basis of the certificateless cryptography, domestic and foreign researchers propose many signature schemes with special properties, such as group signature, multi-signatures, ring signature, blind signature and so on. A group signature scheme allows a group member to sign messages anonymously on behalf of the group, which meets the security requirements of anonymity, nonforgery, traceability, etc. On the basis of the certificateless public key cryptography and group signature, by introducing the concept of bilinear pairings and the DH,CDH and DDH difficult problems based on bilinear pairings, combining the advantages of the threshold signature and multi-signatures, this paper proposes a certificateless group signature scheme based on bilinear pairings. This scheme has the advantages of certificateless public key cryptography, meets the security requirements of group signature, and can easily achieve the accession and revocation of group members, which tracking group members is also more simple. Compared with the existing certificateless group signature schemes, this scheme need less bilinear pairings calculation number and the computational efficiency is higher.

Key words: certificateless, group signature, bilinear pairings, anonymity

CLC Number: