ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
Multi signature is a signature scheme in which signers jointly generate a signature on a message. Threshold multisignature combines the traits of threshold signature and multisignature. In threshold multisignature, a group of users jointly generate a valid multisignature on a message and any one can verify the validity of the multisignature. However, in some applications the signed message is sensitive to the signature receiver. Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier as well. Due to its merits, directed signature scheme is widely used in situations where the receiver's privacy should be protected. By combining all these ideas, in this paper, we propose an ID-based Directed Threshold Multisignature Scheme from bilinear pairings. To the best of our knowledge this is the first directed threshold mulitsignature scheme in the ID-based setting from bilinear pairings. The security of the proposed scheme is based on the Computational Difie-Hellman Problem. Also we have discussed the security properties of the proposed scheme namely, robustness and unforgeability.
Authors and Affiliations
P. Vasudeva Reddy , B. Umaprasada Rao , T. Gowri
Performance Comparison for Resource Allocation Schemes using Cost Information in Cloud
A wide variety of different types of virtual computer are available in cloud computing, each with different usage costs for processing performance and time. Consequently, similar processing tasks can incur different proc...
A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE
In recent years, there has been a plenty of paradigm shifts occurring in the way people across the world could connect and collaborate. Nowadays, wireless connectivity is almost everywhere and getting highly affordable e...
SIMULATION BASED PLANNING FOR DESIGN OF WASHING MACHINE USING H/W & S/W CO DESIGN
A simulator is designed and developed for helping embedded system development team to plan their time schedule, work flow etc. and distribute human resources and their efforts over various phases of washing machine devel...
A Novel Benchmark K-Means Clustering on Continuous Data
Cluster analysis is one of the prominent techniques in the field of data mining and k-means is one of the most well known popular and partitioned based clustering algorithms. K-means clustering algorithm is widely used i...
A Bit Level Session Based Encryption Technique to Enhance Information Security
In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files...