Advertisement

Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing

  • Sandip Vijay
  • Subhash C. Sharma
Part of the Communications in Computer and Information Science book series (CCIS, volume 40)

Abstract

Identity-based systems have the property that a user’s public key can be easily calculated from his identity by a publicly available function. The bilinear pairings, especially Tate pairings, have high performance in cryptography. With the foundation of above two properties, we have proposed a new ID-Based (t, n) threshold signature scheme from Tate pairings. The scheme is proved secure that it can resist attacks including plaintext attack, recovery equation attack, conspiracy attack and impersonation attack. Furthermore, performance analysis shows that the proposed scheme is simple, efficient so that it will be suitable for an environment of finite bandwidth and low capability equipment.

Keywords

Threshold signature identity-based Tate pairing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE Journal of Selected Areas in Communications 7(4), 467–473 (1989)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Communications Letters 7(2), 76–78 (2003)CrossRefGoogle Scholar
  5. 5.
    Desmedt, Y., Frankel, Y.: Shared Generation of Authenticators and Signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)Google Scholar
  6. 6.
    Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signatures Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Baek, J., Zheng, Y.L.: Identity-Based Threshold Signature Scheme from the Bilinear Pairings. In: ITCC 2004, pp. 124–128. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  8. 8.
    Chen, X.F., Zhang, F.G., Konidala, D.M., Kim, K.: New ID-Based Threshold Signature Scheme from Bilinear Pairings. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 371–383. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Cheng, X.G., Liu, J.M., Wang, X.M.: An Identity-Based Signature and Its Threshold Version. In: Advanced Information Networking and Applications-AINA 2005, pp. 973–977. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  10. 10.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate Pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Lee, N.Y.: The security of the improvement on the generalization of threshold signature and authenticated encryption. IEICE Transactions on Fundamentals E85-A(10), 2364–2367 (2002)Google Scholar
  13. 13.
    Lenstra, A.K.: Selecting cryptographic key sizes. J. Cryptology 14(4), 255–293 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Sandip Vijay
    • 1
  • Subhash C. Sharma
    • 2
  1. 1.Wireless Computing Research Lab., Electronics & Computer DisciplineDPT, IIT, RoorkeeSaharanpurIndia
  2. 2.Associate Professor, Wireless Computing Research Lab., Electronics & Computer DisciplineDPT, IIT, RoorkeeSaharanpurIndia

Personalised recommendations