Match!

Integrating Multisignature Scheme into the Group Signature Protocol

Published on Dec 12, 2016
· DOI :10.1007/978-3-319-49073-1_32
Hung Dao Tuan1
Estimated H-index: 1
,
Hieu Minh Nguyen1
Estimated H-index: 1
+ 2 AuthorsMoldovyan Nikolay Adreevich1
Estimated H-index: 1
Cite
Abstract
This paper proposes two new variants of group signature protocols with and without distinguished signing authorities based on the multisignature signature scheme to reduce significantly the signature length and masking signers public keys. The proposed protocols do not include a secret sharing and knowledge proving procedure. Thus, these protocols allow a flexible modification of the group structure by the group manager. Compared to the known group signature protocols, our protocols are designed based on integrating the multisignature scheme into the group signature protocol.
  • References (12)
  • Citations (1)
Cite
References12
Newest
Published on Jan 1, 2017in International Journal of Computer Mathematics1.20
Sk Hafizul Islam11
Estimated H-index: 11
(BITS: Birla Institute of Technology and Science),
Mohammad Sabzinejad Farash18
Estimated H-index: 18
(Kharazmi University)
+ 2 AuthorsMohammad S. Obaidat30
Estimated H-index: 30
(Fordham University)
In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the MTP function are time-consuming operations and they need a large super-singular elliptic curve group. Moreover, the cryptosystems based on them a...
Published on Feb 1, 2009in Computers & Security3.06
Song Lin1
Estimated H-index: 1
(Beihang University),
Biao Wang1
Estimated H-index: 1
(University of International Relations),
Zhoujun Li7
Estimated H-index: 7
(Beihang University)
This paper proposes a digital multi-signature scheme on the generalized conic curve over Z"n. The generalized conic curve R"n (a, b, c) over residue class ring Z"n and its group structure are presented. The paper gives the representation of the order and base point on R"n (a, b, c), and introduces the representation of operation by parameters to simplify its calculation. The scheme security is based on the factoring and discrete logarithms simultaneously. This scheme is easy to accomplish for co...
Published on Jul 19, 2005
Henri Cohen22
Estimated H-index: 22
(University of Bordeaux),
Gerhard Frey7
Estimated H-index: 7
(University of Duisburg-Essen)
+ 4 AuthorsFrederik Vercauteren24
Estimated H-index: 24
(RUB: Ruhr University Bochum)
Preface Introduction to Public-Key Cryptography Mathematical Background Algebraic Background Background on p-adic Numbers Background on Curves and Jacobians Varieties Over Special Fields Background on Pairings Background on Weil Descent Cohomological Background on Point Counting Elementary Arithmetic Exponentiation Integer Arithmetic Finite Field Arithmetic Arithmetic of p-adic Numbers Arithmetic of Curves Arithmetic of Elliptic Curves Arithmetic of Hyperelliptic Curves Arithmetic of Special Cur...
Published on Dec 9, 2001
Ronald L. Rivest75
Estimated H-index: 75
(MIT: Massachusetts Institute of Technology),
A. Shamm71
Estimated H-index: 71
(Weizmann Institute of Science),
Yael Tauman2
Estimated H-index: 2
(Weizmann Institute of Science)
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign any message by using his secret key and the others' public keys, without getting their approval or assi...
Published on Jan 1, 1999in Electronics Letters1.34
Lein Harn29
Estimated H-index: 29
(MU: University of Missouri)
The digital multisignature is signed by group members with knowledge of multiple private keys. Two ElGamal-type efficient multisignature schemes that can combine all individual signatures into a multisignature without any data expansion have previously been proposed. However, since in these two schemes all group members sign the same message, these schemes are called multisignature schemes with undistinguished signing authorities. The authors now modify these schemes and convert them to a multis...
Published on Apr 8, 1991
David Chaum45
Estimated H-index: 45
,
Eugène van Heyst5
Estimated H-index: 5
In this paper we present a new type of signature for a group of persons, called a group signature, which has the following properties: (i) only members of the group can sign messages; (ii) the receiver can verify that it is a valid group signature, but cannot discover which group member made it; (iii) if necessary, the signature can be "opened", so that the person who signed the message is revealed. The group signatures are a "generalization" of the credential/ membership authentication schemes,...
Published on Jan 1, 1984 in CRYPTO (International Cryptology Conference)
Taher El Gamal5
Estimated H-index: 5
The invention pertains to a novel method of forming a flexible, tapered end on a thermoplastic molding strip. The strip is of the type having a top surface shaped to provide desired protective and/or decorative functions. The bottom surface is generally flat for bonding to a desired article such as a side panel or door of an automotive vehicle. In a preferred embodiment, the method comprises removing a V-shaped notch from the end of the strip, with the opening of the V at the end, to form adjace...
Published on Feb 1, 1978in Communications of The ACM5.41
Ronald L. Rivest75
Estimated H-index: 75
(MIT: Massachusetts Institute of Technology),
A. Shamm71
Estimated H-index: 71
(MIT: Massachusetts Institute of Technology),
Leonard M. Adleman37
Estimated H-index: 37
(MIT: Massachusetts Institute of Technology)
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privatel...
Cited By1
Newest
Published on Nov 29, 2018 in PCI (Panhellenic Conference on Informatics)
Anna Triantafyllou1
Estimated H-index: 1
(UoWM: University of Western Macedonia),
Panagiotis G. Sarigiannidis11
Estimated H-index: 11
(UoWM: University of Western Macedonia)
+ 2 AuthorsEider Iturbe2
Estimated H-index: 2
The Electric Smart Grid (ESG) is an intelligent critical infrastructure aiming to create an automated and distributed advanced energy delivery network, while preserving information privacy. This study proposes the implementation of an Anonymous Incident Communication Channel (AICC) amongst smart grids across Europe to improve situational awareness and enhance security of the new electric intelligent infrastructures. All participating organizations will have the ability to broadcast sensitive inf...
Published on Jan 1, 2018
Dao Tuan Hung1
Estimated H-index: 1
,
Nguyen Hieu Minh1
Estimated H-index: 1
,
Nguyen Nam Hai1
Estimated H-index: 1
This paper proposes a new hybrid threshold group signature scheme with distinguished signing authority to provide all proof of member signing processes in case of dispute internally and internal integrity of multisignature generation process. In practical, the proposed scheme has more controls to an organization by using the threshold mechanism and allowing a limited number of members who can authorize transactions while allowing the group to grow. Moreover, the risk of losing group secret eithe...