59,737 Hits in 5.1 sec

Identity Based Threshold Ring Signature [chapter]

Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2005 Lecture Notes in Computer Science  
The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshold ring signature scheme.  ...  In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet  ...  Group-oriented signature schemes [9] enable an entity of a group to produce a signature on behalf of the group.  ... 
doi:10.1007/11496618_17 fatcat:boetdxk4i5dc5lpowm4zpl57qm

Efficient identity-based RSA multisignatures

Lein Harn, Jian Ren
2008 Computers & security  
In this paper, an efficient RSA multisignature scheme based on Shamir's identity-based signature (IBS) scheme is proposed.  ...  To the best of our knowledge, this is the first efficient RSA-based multisignature scheme with both fixed length and the verification time.  ...  For instance, in a (t, n) threshold signature scheme, any t or more than t members can represent the group to generate a group signature.  ... 
doi:10.1016/j.cose.2008.03.003 fatcat:ex2mh2drljabngi6jl6nlx56oa

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications

Jian Ren, Lein Harn
2013 IEEE Transactions on Wireless Communications  
They also proposed an efficient threshold ring signature scheme based on an (n, t)complete fair partition, with complexity O(n log n).  ...  In this paper, a new efficient (t, n)-threshold ring signature scheme is proposed.  ...  A THRESHOLD RING SIGNATURE SCHEME WITH LINEAR EFFICIENCY In this section, a new efficient threshold ring signature scheme is introduced.  ... 
doi:10.1109/twc.2012.12.112120 fatcat:zxiigwhhefgbjidmqwkyea2uk4

Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme [chapter]

Alexandra Boldyreva
2002 Lecture Notes in Computer Science  
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem  ...  Due to the instrumental structure of GDH groups and of the base scheme, it turns out that most of our constructions are simpler, more efficient and have more useful properties than similar existing constructions  ...  Acknowledgements We thank Mihir Bellare for the useful discussions, for suggesting to consider the topic of threshold signatures.  ... 
doi:10.1007/3-540-36288-6_3 fatcat:7ygbetygwndlxfidwbqehyq3eu

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Johann Van Der Merwe, Dawoud S. Dawoud, Stephen McDonald
2007 IEEE Transactions on Parallel and Distributed Systems  
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members  ...  The main objective of this paper is to propose such a secure and efficient threshold-multisignature scheme.  ...  An important component of any threshold digital signature scheme is the sharing of the group key [2] .  ... 
doi:10.1109/tpds.2007.1005 fatcat:a5rjvg6lh5c3jo3kzz45zg7kau

A novel verifiable threshold signature scheme based on bilinear pairing in mobile Ad Hoc Network

Xianyong Meng, Yangmin Li
2012 2012 IEEE International Conference on Information and Automation  
So the new threshold signature scheme is more secure, verifiable, and efficient compared with the presented schemes for Mobile Ad Hoc Network.  ...  We design a new bilinear pairing-based threshold signature scheme which is efficient in terms of both the communication overhead and the computational requirement.  ...  is efficient. proof: In this paper, we propose an efficient threshold key management scheme without trusted party.  ... 
doi:10.1109/icinfa.2012.6246874 fatcat:b5kmkh54fraglcfxenadiw7dk4

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Jianhua Zhu, Guohua Cui, Shiyang Zhou
2009 International Journal of Information Technology and Computer Science  
A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes.  ...  Moreover, this scheme support the group member revocable function efficiently and further has no requirement for time period limits.  ...  Any others cannot open a threshold group signature. Coalition-resistance: Our proposed scheme can resists coalition attack efficiently. when t members want to forge a threshold group signature.  ... 
doi:10.5815/ijitcs.2009.01.03 fatcat:i3bkfqvpuzfsfcjrkbtmx6mh64

Threshold Ring Signatures and Applications to Ad-hoc Groups [chapter]

Emmanuel Bresson, Jacques Stern, Michael Szydlo
2002 Lecture Notes in Computer Science  
Finally we propose an efficient scheme for threshold scenarios based on a combinatorial method and provably secure in the random oracle model.  ...  Then we provide extensions to make ring signatures suitable in practical situations, such as threshold schemes or ad-hoc groups.  ...  An Efficient Threshold Ring Signature Scheme In this section, we describe a methodology to achieve the threshold ring signatures with size O(nlogn), while remaining essentially efficient in terms of signing  ... 
doi:10.1007/3-540-45708-9_30 fatcat:mdwfd6mrjraffijzyqlurvzrcq

A Research Survey of Ring Signature Scheme and Implementation Issues

F. A. Alahmari, Turki. A. Alqarni, Jayaprakash Kar
2016 International Journal of Security and Its Applications  
As compare to the traditional ring signature scheme, it is more efficient that can prevent spurious or fake messages issued in the name of a reputed group by a compromised personnel in the group. a.  ...  In threshold Signature Scheme the information can be encrypted and decrypted, only if T numbers out of n numbers (t<n) in the group use their secret keys.  ...  Taking for an example t out of n threshold ring signatures are defined, investigated regularly.  ... 
doi:10.14257/ijsia.2016.10.6.28 fatcat:sksjgqo3snat5jjoethn2dxgbm

Secure Undeniable Threshold Proxy Signature Scheme

Sattar J.
2014 International Journal of Advanced Computer Science and Applications  
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group to cooperatively sign message on behalf of an original signer.  ...  Additional, we propose the secure, undeniable and known signers threshold proxy signature scheme which answers the drawback of an existed scheme.  ...  The proposed scheme is efficient and secure anti-disreputable conspiracy attacks. Table 1 shows a comparison of threshold proxy signature schemes relied on proxy needs every scheme. VII.  ... 
doi:10.14569/ijacsa.2014.050109 fatcat:ihtsp23izzhpnnyrzqh3mxjpra

Proxy and Threshold One-Time Signatures [chapter]

Mohamed Al-Ibrahim, Anton Cerny
2003 Lecture Notes in Computer Science  
One-time signatures are an important and efficient authentication utility. Various schemes already exist for the classical one-way public-key cryptography.  ...  In this paper, we try to contribute to filling this gap by introducing several group-based one-time signature schemes of various versions: with proxy, with trusted party, and without trusted party.  ...  broadcast or group-based applications efficiently, rather than using typical signature schemes.  ... 
doi:10.1007/978-3-540-45203-4_10 fatcat:rzeimrnx5bhnlodfhfmxednasy

On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme [chapter]

Guilin Wang
2003 Lecture Notes in Computer Science  
In this paper, we first present a definition of threshold group signatures, and propose several requirements to evaluate whether a threshold group signature scheme is secure and efficient.  ...  Then we investigate the security and efficiency of a threshold group signature scheme proposed by Li, Hwang, Lee and Tsai, and point out eight weaknesses in their scheme.  ...  As an example of his generalized group signature scheme, Camenisch presented the first threshold group signature scheme.  ... 
doi:10.1007/3-540-36552-4_6 fatcat:dpgerhwkxjesnobca7geffah3u

A Threshold Signature Scheme Based on TPM

Zhi-Hua Zhang, Si-Rong Zhang, Wen-Jin Yu, Jian-Jun Li, Bei Gong, Wei Jiang
2011 International Journal of Communications, Network and System Sciences  
proof between it an other members who take part in the signature.  ...  For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn't do well in resisting internal  ...  Saxena, "An Efficient Certificate-Less Signature Scheme," Proceedings of Computational Intelligence and Security, Springer, Berlin, 2006, pp. 110-116.  ... 
doi:10.4236/ijcns.2011.410075 fatcat:lphgvqg2vjgqdm25lfboyjm5vy

An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol

Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
2004 Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN '04  
In this paper we show an attack on this proposed proactive RSA scheme, in which an admissible threshold of malicious group members can completely recover the group RSA secret key in the course of the lifetime  ...  The URSA protocol relies on the new proactive RSA signature scheme, which allows members in an ad hoc group to make access control decisions in a distributed manner.  ...  Therefore, an efficient provably secure proactive RSA signature scheme would offer an attractive alternative to the above systems.  ... 
doi:10.1145/1029102.1029105 dblp:conf/sasn/JareckiSY04 fatcat:sauilwslizgv7caiaf4praljsu

Efficient identity-based GQ multisignatures

Lein Harn, Jian Ren, Changlu Lin
2009 International Journal of Information Security  
In this paper, an efficient identity-based multisignature (IBMS) scheme is proposed for the GQ IBS scheme, which allows multiple users using the ISO/IEC 14888-2 standard GQ scheme to generate multisignatures  ...  The scheme is efficient in the sense that both the length and the verification time of the multisignatures are fixed.  ...  The length of the group signature is fixed and the verification time of the group signature is also constant. However, it is only an (n, n) threshold signature scheme.  ... 
doi:10.1007/s10207-008-0072-z fatcat:w6lizmy7azfzhkrgqq37vgovtm
« Previous Showing results 1 — 15 out of 59,737 results