Abstract
In this paper, a modified signature scheme with (t, n) threshold group-oriented for applications in an ubiquitous environment is proposed. In the proposed scheme, any group of more than t out of n members can cooperate to generate the group signature. The message recovery property is also added into the scheme. By employing the public key of the verifier, the transmission of the signature will be secured. Finally, to detect a removal by an eavesdropper, the linkage property between signed ciphertexts of message blocks is also added into the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaum, D., Van Heyst, E.: Group signature. In: Advances in Cryptology-Proceedings of Eurocrypto 1991, pp. 257–265. Springer, Heidelberg (1991)
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. on Information Theory IT-31(4), 469–472 (1985)
Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Comput. Digit. Tech. 141(5), 307–313 (1994)
Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc. Comput. Digit. Tech. 145(2), 117–120 (1998)
Kenneth, H.R.: Elementary number theory and its applications, 2nd edn., pp. 249–298. Addison-Wesley, Reading (1987)
Lee, W.B., Chang, C.C.: Efficient group signature scheme based on the discrete logarithm. IEE Proc. Comput. Digit. Tech. 145(1), 15–18 (1998)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 521–528 (1980)
Shamir, A.: How to share a secret. Commun. ACM 24(11), 612–613 (1979)
Homma, K., Sato, Y., Kato, H., Fukumoto, T., Yano, K., Kawakami, K., Sakaki, T., Funabashi, K.: Systems Technologies for the Ubiquitous Society. Systems, Man and Cybernetics 2, 1989–1994 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, CC., Chen, KL., Lin, CH., Chang, JC. (2006). A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_83
Download citation
DOI: https://doi.org/10.1007/11833529_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)