2,009 Hits in 4.5 sec

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures

Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li
2008 Journal of Communications  
In this paper, we propose a publicly verifiable member-join protocol for threshold signatures.  ...  Index Terms-verifiable secret sharing, publicly verifiable secret sharing, verifiable secret redistribution, verifiable encryption I.  ...  It is impossible for scheme [26] . VI. CONCLUSIONS In this paper, we propose a publicly verifiable secret sharing member-join protocol for threshold signatures.  ... 
doi:10.4304/jcm.3.7.36-43 fatcat:q4d74cylsbaw5k2mno5no2cu5a

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Johann Van Der Merwe, Dawoud S. Dawoud, Stephen McDonald
2007 IEEE Transactions on Parallel and Distributed Systems  
Index Terms-Security and protection, distributed systems, group-oriented cryptography, threshold-multisignature, secret sharing, distributed-key management infrastructure, publicly verifiable distributed-key  ...  The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first  ...  A mechanism is provided for verifying the members' secret contributions from the threshold-multisignature without revealing any additional information of the secrets, except the information that is publicly  ... 
doi:10.1109/tpds.2007.1005 fatcat:a5rjvg6lh5c3jo3kzz45zg7kau

Threshold cryptography in P2P and MANETs: The case of access control

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
2007 Computer Networks  
We investigate, in particular, the applicability and the utility of threshold cryptography (more specifically, various flavors of existing threshold signatures) towards this goal.  ...  Decentralized access control is the fundamental security service for ad hoc groups.  ...  as opposed to polynomial secret sharing of [41] ) the members participating in the threshold signature protocol need to reconstruct the secret shares of the group members that are currently inaccessible  ... 
doi:10.1016/j.comnet.2007.03.001 fatcat:fxrfhfrmbndannbemz5ju24u2e

A public key management scheme and threshold-multisignature scheme for mobile ad hoc networks

J. van der Merwe, D.S. Dawoud, S. McDonald
2006 SAIEE Africa Research Journal  
.: ad hoc networks oner communication over a shared wireless channel without any pre-existing inli'astructure, Threshold digital signatures are an important cryptographic tool used in most existing key  ...  group, The group signature is publicly veri liable and allows any outsider to establish the identity or the individual signers, Tbe paper proposes a .l' elj~ccrlij;ed pllhlic key i.l'.I'lii/lg prolocol  ...  Each P, broadcasts its sci f-certi ficate to all P j for} = I: n,j -::F i. 3.2) Initial publicly verifiable distributed grollp key generation The publicly verifiable distributed group key generation  ... 
doi:10.23919/saiee.2006.9488029 fatcat:3o7kdtlhqngkbifn7w4azd22nq

Cryptographic techniques for mobile ad-hoc networks

Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
2007 Computer Networks  
Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number  ...  New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication.  ...  This author is solely responsible for the view expressed in this paper, which does not necessarily reflect the position of UNESCO nor commits that organization.  ... 
doi:10.1016/j.comnet.2007.08.002 fatcat:kpkytiuoirftdh3gsjkad76i4i

Identity-Based Access Control for Ad Hoc Groups [chapter]

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
2005 Lecture Notes in Computer Science  
Group access control includes mechanisms for admission as well as revocation/eviction of group members.  ...  In addition, secure membership revocation is required to evict misbehaving or malicious members.  ...  This is achieved by secret-sharing the signature key among the group members, and allowing them to compute a signature on some message via a distributed protocol in which the members use the shares of  ... 
doi:10.1007/11496618_27 fatcat:2kifh7bgufexdnokgjdq3zhx7a

Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks

N. Saxena, Jeong Hyun Yi
2009 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a power-aware and fully noninteractive self-certification protocol based on bi-variate polynomial secret sharing and a non-interactive threshold signature scheme.  ...  However, lack of infrastructure and centralized control make MANETs inherently insecure, and therefore specialized security services are needed for their deployment.  ...  The authors would also like to thank Gene Tsudik for his collaboration on the conference version [36] related to this paper. Jeong Hyun Yi is the corresponding author.  ... 
doi:10.1109/tifs.2009.2031946 fatcat:obozgschzrfjnagflvf55obh4i

Dynamic Threshold Cryptosystem without Group Manager

Andreas Noack, Stefan Spitz
2009 Network Protocols and Algorithms  
Dynamic threshold cryptosystems are best suited to realize distributed signatures in dynamic (e.g. ad-hoc) networks.  ...  Network Protocols and Algorithms  ...  An additional property of this scheme is the verifiability of all member shares (VSS -Verifiable Secret Sharing).  ... 
doi:10.5296/npa.v1i1.161 fatcat:54ynpm4gunc7rdilizuzkc3tse

Privacy-preserving admission to mobile peer-to-peer groups

Mark Manulis
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
Existing mechanisms based on threshold cryptography require that prospective members collect sufficient number of individual votes from the group prior to obtaining a membership credential.  ...  members.  ...  All these protocols rely on the static admission policy since the threshold value used in the secret sharing scheme remains constant.  ... 
doi:10.1109/percomw.2010.5470612 dblp:conf/percom/Manulis10 fatcat:oaxmihspezd7joy6prmxqnrpzm

Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs

N. Saxena, G. Tsudik, Jeong Hyun Yi
2009 IEEE Transactions on Parallel and Distributed Systems  
Our admission protocol is based on secret sharing techniques using bi-variate polynomials.  ...  In this paper we focus on a common type of MANET that is formed on a temporary basis, and present a secure, efficient and a fully non-interactive admission technique geared for this type of a network.  ...  Signature´ ×µ can be publicly verified by computing Ö × Ý ´Ñ Ó Ôµ and then checking if À´Ñ Öµ. F.  ... 
doi:10.1109/tpds.2008.77 fatcat:4mm5s6o4ebaohpe6vffalqy2py

Secret interest groups (SIGs) in social networks with an implementation on Facebook

Alessandro Sorniotti, Refik Molva
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
secret, sensitive or private topics.  ...  Members exchange credentials that can be used inside the social network to authenticate upon friendship requests or to secure user-generated content.  ...  signature on the message m iff w = g vh(m) −1 (g x ) −wh(m) −1 mod p mod q; A threshold signature scheme [8, 10, 11] leverages on the aforementioned secret sharing techniques in order to share the secret  ... 
doi:10.1145/1774088.1774219 dblp:conf/sac/SorniottiM10 fatcat:xlzw4jffvbdt3j45vggjb3g55i

On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol

Stanisław Jarecki, Nitesh Saxena
2010 IEEE Transactions on Information Forensics and Security  
Our attack stems from the fact that the threshold signature protocol which is a part of this proactive RSA scheme leaks some seemingly innocuous information about the secret signature key.  ...  We show how the corrupted members can influence the execution of the scheme in such a way so that the slowly leaked information is used to reconstruct the entire shared secret.  ...  in the threshold signature protocol need to reconstruct the secret shares of the group members that are currently inaccessible to them.  ... 
doi:10.1109/tifs.2010.2058104 fatcat:4qa52da3qbgupigimk4ymajxtm

On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme [chapter]

Guilin Wang
2003 Lecture Notes in Computer Science  
A (t, n) threshold group signature scheme is a generalization of group signature, in which only t or more members from a given group with n members can represent the group to generate signatures anonymously  ...  In this paper, we first present a definition of threshold group signatures, and propose several requirements to evaluate whether a threshold group signature scheme is secure and efficient.  ...  Here is the basic idea: Member n selects random numbers as secret shares for the first t − 1 (honest) members, but computes other shares for the rest members (his accomplices).  ... 
doi:10.1007/3-540-36552-4_6 fatcat:dpgerhwkxjesnobca7geffah3u

Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting [article]

Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
2021 arXiv   pre-print
However, it lacks accountability and is not designed for open blockchains that require no trust assumptions.  ...  The property of accountability allows the modifier's identity and her rewriting privileges to be held accountable for the modified transactions in case of malicious rewriting (e.g., modify the registered  ...  Dynamic Proactive Secret Sharing A dynamic proactive secret sharing DPSS consists of Share, Redistribute, and Open [11] protocols.  ... 
arXiv:2104.13543v1 fatcat:p3yflwzusnezdoshm2j7ydg33y

Group-based Authentication Methodologies

Pathan Mohd Shafi
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Group signature mechanism TCGA (Threshold Cryptography-based Group Authentication) addresses security issue or parameter by considering shamir's secret key generation, public key infrastructure and group  ...  GAS (Group Authentication System) is another scheme which we have considered to compare or to evaluate; It also uses shamir's secret key generation method and public key infrastructure for security or  ...  The scheme also helps for establishment of a shared secret key. This secret key can be used further for any group-oriented applications.  ... 
doi:10.30534/ijatcse/2020/01922020 fatcat:h44ige7o7fcaplt33o5g7vs6ei
« Previous Showing results 1 — 15 out of 2,009 results