This paper proposes two new variants of group signature protocols with and without distinguished signing authorities based on the multisignature signature scheme to reduce significantly the signature length and masking signers public keys. The proposed protocols do not include a secret sharing and knowledge proving procedure. Thus, these protocols allow a flexible modification of the group structure by the group manager. Compared to the known group signature protocols, our protocols are designed based on integrating the multisignature scheme into the group signature protocol.

In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the MTP function are time-consuming operations and they need a large super-singular elliptic curve group. Moreover, the cryptosystems based on them a...

(University of International Relations), Zhoujun Li7

Estimated H-index: 7

(Beihang University)

This paper proposes a digital multi-signature scheme on the generalized conic curve over Z"n. The generalized conic curve R"n (a, b, c) over residue class ring Z"n and its group structure are presented. The paper gives the representation of the order and base point on R"n (a, b, c), and introduces the representation of operation by parameters to simplify its calculation. The scheme security is based on the factoring and discrete logarithms simultaneously. This scheme is easy to accomplish for co...

Preface Introduction to Public-Key Cryptography Mathematical Background Algebraic Background Background on p-adic Numbers Background on Curves and Jacobians Varieties Over Special Fields Background on Pairings Background on Weil Descent Cohomological Background on Point Counting Elementary Arithmetic Exponentiation Integer Arithmetic Finite Field Arithmetic Arithmetic of p-adic Numbers Arithmetic of Curves Arithmetic of Elliptic Curves Arithmetic of Hyperelliptic Curves Arithmetic of Special Cur...

In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign any message by using his secret key and the others' public keys, without getting their approval or assi...

The digital multisignature is signed by group members with knowledge of multiple private keys. Two ElGamal-type efficient multisignature schemes that can combine all individual signatures into a multisignature without any data expansion have previously been proposed. However, since in these two schemes all group members sign the same message, these schemes are called multisignature schemes with undistinguished signing authorities. The authors now modify these schemes and convert them to a multis...

In this paper we present a new type of signature for a group of persons, called a group signature, which has the following properties: (i) only members of the group can sign messages; (ii) the receiver can verify that it is a valid group signature, but cannot discover which group member made it; (iii) if necessary, the signature can be "opened", so that the person who signed the message is revealed. The group signatures are a "generalization" of the credential/ membership authentication schemes,...

The invention pertains to a novel method of forming a flexible, tapered end on a thermoplastic molding strip. The strip is of the type having a top surface shaped to provide desired protective and/or decorative functions. The bottom surface is generally flat for bonding to a desired article such as a side panel or door of an automotive vehicle. In a preferred embodiment, the method comprises removing a V-shaped notch from the end of the strip, with the opening of the V at the end, to form adjace...

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privatel...

(UoWM: University of Western Macedonia)+ 2 AuthorsEider Iturbe2

Estimated H-index: 2

The Electric Smart Grid (ESG) is an intelligent critical infrastructure aiming to create an automated and distributed advanced energy delivery network, while preserving information privacy. This study proposes the implementation of an Anonymous Incident Communication Channel (AICC) amongst smart grids across Europe to improve situational awareness and enhance security of the new electric intelligent infrastructures. All participating organizations will have the ability to broadcast sensitive inf...

This paper proposes a new hybrid threshold group signature scheme with distinguished signing authority to provide all proof of member signing processes in case of dispute internally and internal integrity of multisignature generation process. In practical, the proposed scheme has more controls to an organization by using the threshold mechanism and allowing a limited number of members who can authorize transactions while allowing the group to grow. Moreover, the risk of losing group secret eithe...