Skip to main content

A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

  • 626 Accesses

Abstract

In this paper, a modified signature scheme with (t, n) threshold group-oriented for applications in an ubiquitous environment is proposed. In the proposed scheme, any group of more than t out of n members can cooperate to generate the group signature. The message recovery property is also added into the scheme. By employing the public key of the verifier, the transmission of the signature will be secured. Finally, to detect a removal by an eavesdropper, the linkage property between signed ciphertexts of message blocks is also added into the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaum, D., Van Heyst, E.: Group signature. In: Advances in Cryptology-Proceedings of Eurocrypto 1991, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  2. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)

    Google Scholar 

  3. ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. on Information Theory IT-31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  4. Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Comput. Digit. Tech. 141(5), 307–313 (1994)

    Article  MATH  Google Scholar 

  5. Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc. Comput. Digit. Tech. 145(2), 117–120 (1998)

    Article  Google Scholar 

  6. Kenneth, H.R.: Elementary number theory and its applications, 2nd edn., pp. 249–298. Addison-Wesley, Reading (1987)

    Google Scholar 

  7. Lee, W.B., Chang, C.C.: Efficient group signature scheme based on the discrete logarithm. IEE Proc. Comput. Digit. Tech. 145(1), 15–18 (1998)

    Article  Google Scholar 

  8. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 521–528 (1980)

    MathSciNet  Google Scholar 

  9. Shamir, A.: How to share a secret. Commun. ACM 24(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  10. Homma, K., Sato, Y., Kato, H., Fukumoto, T., Yano, K., Kawakami, K., Sakaki, T., Funabashi, K.: Systems Technologies for the Ubiquitous Society. Systems, Man and Cybernetics 2, 1989–1994 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, CC., Chen, KL., Lin, CH., Chang, JC. (2006). A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_83

Download citation

  • DOI: https://doi.org/10.1007/11833529_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics