Proceedings ArticleDOI
Joint Multiple signature scheme for group-oriented authentication and non-repudiation
TLDR
The proposed scheme is an extension of DSA to a group of signers who jointly sign the message and can be used for group membership authentication, such as E-commerce and E-government.Abstract:
This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z∗ p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.read more
Citations
More filters
Book ChapterDOI
A General Framework for Group Authentication and Key Exchange Protocols
TL;DR: A novel framework for group authentication and key exchange protocols that works in a one-to-multiple mode, and can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward security.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.