ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURITY EVALUATION OF AN ORDER-SPECIFIED, IDENTITY-BASED AGGREGATE SIGNATURE SCHEME

Proceeding: The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC)

Publication Date:

Authors : ; ; ; ;

Page : 51-57

Keywords :

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper considers the security of orde red identity-based aggregate signatures that work in the Gap-Diffie-Hellman (GDH) group. By adapting a signature scheme, an identity-based signature verification key, and other identifying information, it is possible to facilitate the identification of the owner of the verification key. It has been shown that an aggregate signature can efficiently aggregate the signatures of multiple signers, and further, identity-based aggregate signatures can be used in a variety of applications. In this paper, considering the security of identity-based aggregate signatures, the subsequent signer cannot chooses a string that has been used by the previous signer to create a signature, and these signatures are sequentially combined to obtain the ordered identity-based aggregate signature.

Last modified: 2014-01-05 06:38:07