A Group Digital Signature Technique for Authentication
نویسندگان
چکیده
A group digital signature technique using a digital signature algorithm and a challenge-response identification protocol is proposed to provide effective authentication. The proposed digital signature algorithm is based on solving quadratic congruence, factorization. and discrete logarithm problems. Based on the public key infrastructure, group members generate their public-private keys first. The designed authority generates the group member’s identity code (ID), the group identity mark, and the group secret key. Every group member keeps hisiher private key and the ID for signing. These parameters can ensure only members who can make signatures and provide data authenticity and non-repudiation for any signer. The challenge-response identification protocol with overlapping-shifting-EXOR logical operations is proposed to ensure the signer to obtain group secret key securely and prevent any signer from making false claims. According to the security analysis, the processing time of the proposed approach is faster than the existing RSA and ElGamal group digital signature systems. Moreover, the proposed method would be suited to microprocessor-based devices such as smart cards, computer systems, networks and control systems because of its simplicity, confidentiality, and fast processing speed.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملGenerating Robust Digital Signature for Image/Video Authentication
Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video au...
متن کاملCombined Digital Signature and Digital Watermark Scheme for Image Authentication
Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Meantime, the watermark technique embeds some information in the host image. In this paper, a combined digital watermark and digital signature scheme for image authentication is proposed. The scheme extracts signature from ...
متن کاملIssues on Image Authentication
Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital sig...
متن کاملA Review on Multi Level Identity Based Cryptography for Secure Digital Signature Authentication
Digital Signature authentication is widely used mechanism to transfer sensitive information over networks securely. Digital signature is an electronic signature used for authentication of identity of parties in applications like E-commerce which are frequently involved in monetary transactions. Identity based cryptography can secure digital signature authentication besides ensuring integrity, c...
متن کامل