Elsevier

Computer Communications

Volume 20, Issue 11, 15 October 1997, Pages 1019-1026
Computer Communications

Research note
ID-based group-oriented cryptosystem and its digital signature scheme

https://doi.org/10.1016/S0140-3664(97)00092-3Get rights and content

Abstract

Inspired from Tsujii and Itoh's system, we propose an ID-based group-oriented cryptosystem and its digital signature scheme. In the proposed cryptosystem, any entity for decrypting or signing a message is dedicated to “group”, instead of “individual”. A group, consisting of a set of individuals, could be specified as high-authorized, low-authorized or threshold-authorized according to the predefined authorization strategy. Any sender can encrypt a message addressed to a group with only knowing the group's identity and the corresponding public information, so that individuals of the group should cooperate to recover the message by following the authorization strategy. For signing a message, individuals of the group should cooperate to generate a group signature by following the authorization strategy, so that any verifier can validate the group signature with only requiring the group's identity and the corresponding public information. The sender of a secret message or the verifier of a group signature does not necessarily know the authorization strategy within that group in advance.

References (15)

  • T. Hwang

    Protocols for group oriented secret sharing

    Information Processing Letters

    (1992)
  • Data Encryption Standard
  • R. Rivest et al.

    A method for obtaining digital signature and public-key cryptosystem

    Communications of the ACM

    (1978)
  • T. ElGamal

    A public-key cryptosystem and a signature scheme based on discrete logarithms

    IEEE Transactions on Information Theory

    (1985)
  • Y. Desmedt

    Society and group oriented cryptography: a new concept

  • C.C. Chang et al.

    A new generalized group-oriented cryptoscheme without trusted centers

    IEEE Journal on Selected Areas in Communications

    (1993)
  • Y. Desmedt et al.

    Threshold cryptosystems

There are more references available in the full text version of this article.

Cited by (1)

View full text