89 Hits in 5.7 sec

"Discrete Logarithm based 't, n' Threshold Group Signature Scheme"

Ganesh Mante, S.D. Joshi
2011 International Journal of Computer Applications  
Following some ideas of the classical threshold signature scheme, a (t, n) threshold group signature scheme and (k, m) threshold group signature verification scheme based on discrete logarithm problem  ...  A (t, n) threshold group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group.  ...  I am also grateful to BVDU team for providing us with the setup for work, without which implementation was just impossible.  ... 
doi:10.5120/2483-3343 fatcat:is5wed46hzfhhdmxca3mxkvj2y

Democratic group signatures with threshold traceability

Xiang-xue Li, Hai-feng Qian, Jian-hua Li
2009 Journal of Shanghai Jiaotong University (Science)  
t, n)-threshold traceability which combines the concepts of group signatures and of threshold cryptography.  ...  The idea behind the (t, n)-threshold traceability is to distribute between n group members the capability of tracing the actual signer such that any subset of not less than t members can jointly reconstruct  ...  We revisit the requirement of individual traceability described in [19] by presenting the term threshold traceability. We express (t, n) threshold traceability for DGSs as the following.  ... 
doi:10.1007/s12204-009-0098-z fatcat:jqlxs7szj5bqfh2sjdy6fonk6y

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Johann Van Der Merwe, Dawoud S. Dawoud, Stephen McDonald
2007 IEEE Transactions on Parallel and Distributed Systems  
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members  ...  In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature.  ...  The proposed threshold-multisignature scheme, is to the best of the authors' knowledge, the first threshold group-oriented signature scheme with traceability that allow malicious members to be positively  ... 
doi:10.1109/tpds.2007.1005 fatcat:a5rjvg6lh5c3jo3kzz45zg7kau

On the Security of Two Threshold Signature Schemes with Traceable Signers [chapter]

Guilin Wang, Xiaoxi Han, Bo Zhu
2003 Lecture Notes in Computer Science  
In 2001, based on a variant of ElGamal digital signature scheme, Li et al. proposed two (t, n) threshold signature schemes with traceable signers.  ...  A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t − 1 or less members cannot do the same thing.  ...  s two (n, t) threshold signature schemes with traceable signers [10] .  ... 
doi:10.1007/978-3-540-45203-4_9 fatcat:no52tobpdjayrlkfkknpyepst4

Threshold Signatures: Current Status and Key Issues

Min-Shiang Hwang, Ting Yi Chang
2005 International Journal of Network Security  
In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes.  ...  In this paper, we survey all related threshold signature schemes and classify them with different properties.  ...  For the (t, n) threshold signature schemes with (k, l) shared verification and (t, n) threshold signature schemes with Traceability/Untraceabilit, we review Chang et al.'  ... 
dblp:journals/ijnsec/HwangC05 fatcat:ie2zypu6t5b37mp6vuxgkzm2oi

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.  ...  Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings.  ...  [95] extended Manulis's [92] democratic group signature scheme with threshold traceability where t group members must collude to trace signers (t is the threshold value).  ... 
doi:10.3390/cryptography6010003 fatcat:dby2hr4g4zhqtemdm3tm43552u


H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  In this paper after taking a review of various proposed schemes, problems and attacks for MANETs and their solutions, In order to make any system secure, the security services such as authentication, confidentiality  ...  This paper presents a significantly improved construction and a complete rewrite and evaluation of our implementation that can significantly improves the overall concept of security for MANETs by using threshold  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq

k-Times Full Traceable Ring Signature

Xavier Bultel, Pascal Lafourcade
2016 2016 11th International Conference on Availability, Reliability and Security (ARES)  
Our primitive k-FTRS can be used to construct a k-times veto scheme or a proxy e-voting scheme that prevents denial-of-service caused by cheating users. * This research was conducted with the support of  ...  Moreover, k-times traceable group and ring signatures [1] allow anyone to publicly trace two signatures from a same user if he exceeds the a priori authorized number of signatures.  ...  In [6] , the authors present a scheme where the size of a signature is constant, i.e. it does not depend to the group size. Some group/ring signature schemes deal with linkability.  ... 
doi:10.1109/ares.2016.37 dblp:conf/IEEEares/Bultel016 fatcat:irydinsm5fayxavv52erqwvqai

Improvement of Threshold Signature Using Self-certified Public Keys

Zuhua Shao
2005 International Journal of Network Security  
A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot.  ...  Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys.  ...  A (t, n) threshold signature scheme [2] is a group oriented signature scheme, which allows any t or more signers to cooperatively sign messages on behalf of the group, but t − 1 or fewer signers do not  ... 
dblp:journals/ijnsec/Shao05 fatcat:dlkl725umbb4vbtfi3dbfoyztu

Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications

Ke Gu, LinYu Wang, Na Wu, NianDong Liao
2018 International Journal of Network Security  
With the rapid development of identity-based cryptography, several traceable (or linkable) identity-based ring signature (TIBRS) schemes have been proposed.  ...  However, identity-based cryptography still has the problem of private key management and few traceable ring signature schemes are constructed in the standard model.  ...  [5] proposed a new identitybased event-oriented linkable ring signature scheme with an option as revocable-iff-linked.  ... 
dblp:journals/ijnsec/GuWWL18 fatcat:pnjmrrg6d5fljc4lt6h323vdhq

Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature

Yuan Huang, Shengke Zeng, Xingwei Liu
2015 International Journal of Network Security  
In this paper, we introduce an efficient communication protocol for vehicular ad hoc networks (VANETs) based on conditionally anonymous ring signature scheme to address the issue on anonymous authentication  ...  The signer in the ring signature algorithm can randomly choose members (with their public keys) to form a group without these members' consent.  ...  In addition, the group-oriented signature-based approaches can avoid the inefficiency existed in pseudonyms-based approaches.  ... 
dblp:journals/ijnsec/HuangZL15 fatcat:7pfwbf36jfeolaws3lbs7tc2cm

A public key management scheme and threshold-multisignature scheme for mobile ad hoc networks

J. van der Merwe, D.S. Dawoud, S. McDonald
2006 SAIEE Africa Research Journal  
lold-1Il11lli.l'igllalll/'c scheme designed speeilically lor mobile ad hoc networks, The signature scheme allows a subset or shareholders with threshold I. to sign an arbitrary message on behalr or the  ...  group, The group signature is publicly veri liable and allows any outsider to establish the identity or the individual signers, Tbe paper proposes a .l' elj~ccrlij;ed pllhlic key i.l'.I'lii/lg prolocol  ...  I\n important component or any threshold digital signature scheme is the sharing of the group key [20].  ... 
doi:10.23919/saiee.2006.9488029 fatcat:3o7kdtlhqngkbifn7w4azd22nq

Group-based Authentication Methodologies

Pathan Mohd Shafi
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Group signature mechanism TCGA (Threshold Cryptography-based Group Authentication) addresses security issue or parameter by considering shamir's secret key generation, public key infrastructure and group  ...  Group signature try to address problem faced in TCGA and GAS i.e. to generate new key every time whenever any new member adds in group by creating static key at first time or at the time of starting of  ...  This scheme is dependent upon paillier threshold scheme. The Paillier Threshold Cryptography is a public key variant of the (t, n) threshold scheme.  ... 
doi:10.30534/ijatcse/2020/01922020 fatcat:h44ige7o7fcaplt33o5g7vs6ei

A threshold signature scheme for group communications without a shared distribution center

Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang
2004 Future generations computer systems  
In this paper, we shall propose a (t, n) threshold signature with (k, l) threshold-shared verification to be used in a group-oriented cryptosystem without a shared distribution center (SDC).  ...  In this scheme, any t participants can represent a group (signing group) to sign a message, and any k participants can represent another group (verifying group) to verify the signature.  ...  In addition, in order to trace back to find the signers or to provide anonymity for the signers, several (t, n) threshold schemes with traceable or untraceable signers and their comments have been proposed  ... 
doi:10.1016/j.future.2003.09.005 fatcat:7nx2up2ab5echaiigwwjir2zpm

Secure Obfuscation for Encrypted Group Signatures

Yang Shi, Qinpei Zhao, Hongfei Fan, Qin Liu, Vince Grolmusz
2015 PLoS ONE  
The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures.  ...  In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems.  ...  Because there are many variations of digital signature schemes (e.g., group-oriented, identity-based, etc.), it is out of the scope of this paper.  ... 
doi:10.1371/journal.pone.0131550 pmid:26167686 pmcid:PMC4517473 fatcat:c5ixoaobqzfyppsoooyql5zaqm
« Previous Showing results 1 — 15 out of 89 results