SECURITY EVALUATION OF AN ORDER-SPECIFIED, IDENTITY-BASED AGGREGATE SIGNATURE SCHEME
Proceeding: The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC)Publication Date: 2013-11-11
Authors : Tomoya Iwasaki; Naoto Yanai; Masaki Inamura; Keiichi Iwamura;
Page : 51-57
Keywords :
Abstract
This paper considers the security of orde red identity-based aggregate signatures that work in the Gap-Diffie-Hellman (GDH) group. By adapting a signature scheme, an identity-based signature verification key, and other identifying information, it is possible to facilitate the identification of the owner of the verification key. It has been shown that an aggregate signature can efficiently aggregate the signatures of multiple signers, and further, identity-based aggregate signatures can be used in a variety of applications. In this paper, considering the security of identity-based aggregate signatures, the subsequent signer cannot chooses a string that has been used by the previous signer to create a signature, and these signatures are sequentially combined to obtain the ordered identity-based aggregate signature.
Other Latest Articles
- CONTENT-KEY MANAGEMENT AND AUTHENTICATION MECHANISM FOR DE-CENTRALIZATION IN CONTENT DISTRIBUTION SERVICE
- A KEY MANAGEMENT SYSTEM WITH A STORAGE-SAVING SECRET SHARING SCHEME IN A SENSOR NETWORK
- CONTEXT-AWARENESS IN MOBILE CLOUD COMPUTING: HEALTHCARE
- COMPARISON AND IMPLEMENTATION OF SECRET SHARING SUITABLE FOR LIFE LOG SYSTEM
- USING DSM TO GENERATE DATABASE SCHEMA AND DATA MANAGEMENT
Last modified: 2014-01-05 06:38:07