scispace - formally typeset
Proceedings ArticleDOI

Joint Multiple signature scheme for group-oriented authentication and non-repudiation

TLDR
The proposed scheme is an extension of DSA to a group of signers who jointly sign the message and can be used for group membership authentication, such as E-commerce and E-government.
Abstract
This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z∗ p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.

read more

Citations
More filters
Book ChapterDOI

A General Framework for Group Authentication and Key Exchange Protocols

TL;DR: A novel framework for group authentication and key exchange protocols that works in a one-to-multiple mode, and can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward security.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.