This website uses cookies to ensure you have the best experience.

# Rsa Based Undeniable Signature For A Group

1071 words - 5 pages

3. Proposed Approach
In this paper, a new RSA-based undeniable signatures approach for a group is proposed. A group member can sign a document on behalf of the group without revealing the identity of the actual signer. The group secret key is split into two parts by Group Manager, one part is provided, as his group membership secret, to the group member; and the other part is provided to a trusted security mediator, SM. In our scheme, it is ensured that the group public key size and the group signature length are independent of the group size and, therefore, remain constant. The group signature is realized by the collaboration of the group member and the SM. Neither of the two can produce a ...view middle of the document...

But in our scheme neither the SM nor group member(s) is able to factor the modulus and compute the private key corresponding to group public key. So the scheme allows sharing of common modulus. However, a user-SM coalition can totally break the signature scheme. Therefore, SM must be assumed to be completely trusted party.
4. The Proposed Scheme
Assumption: All the internal communications are secure. A • B denotes A multiply B.
Step 1. Setup:
GM generates two large random prime numbers, P & Q. He then computes N = P × Q and Φ(N) = (P-1) × (Q-1). The parameters D, E ∈ Z*N are selected such that DE≡ 1 mod Φ(N).
SM also generates two large random prime numbers, p & q and computes n = p × q, where n < N, and Φ(n) = (p-1) × (q-1). The parameters d, e ∈ Z*n are selected such that de≡ 1 mod Φ(n).
SM also selects a generator g ∈ Z*n, g ≠ 1, and a parameter y = gd (mod n) is computed.
The group public keys are (N, E) and (n, g, y), while D and (d, e) are kept secret by GM and SM, respectively.
Step 2. Join:
Suppose that a member Ui wants to join the group. GM chooses a random number Xi ∈R Z*N and computes Yi= (D– Xi) (mod Φ(N)). Xi is sent to Ui and (Yi, Ui) is sent to SM.
After the join protocol, Ui becomes a valid member of the group with Xi as his group membership secret key. Following conditions must be met while generating the members’ secret keys:
• Xi ≠ Xj for each i ≠ j.
• X1 + X2 + …+ Xk ≠ D (mod Φ(N)) for any positive integer k.
• X1 + X2 + …+ Xi ≠ Xj (mod Φ(N)) for any positive integers i and j.
It is to be noted that Xi is the partial secret key of the member Ui and Yi is the partial secret key of SM.
Step 3. Sign:
The group signature on message M is generated by the collaboration between Ui and SM as:
 Ui computes m= H(M).
Ui→ SM: (m, Ui).
 SM checks that Ui’s membership has not been revoked. He then stores (Ui, m) and computes A = md (mod n) and partial group signature, B = AYi...

## Find Another Essay On RSA-based Undeniable Signature for a Group

### A Creative Group Proposal for Assisting Veterans

1623 words - 7 pages interest, decreased participation in important activities, feeling detached from others, isolated, restricted range of feelings (e.g., cannot have sympathetic feelings), loss of sex drive, hopelessness or diminished sense of a future life, and depression. The creative arts activity is find what specific symptom is most distressing for the specific group member and to draw out how they have managed when this symptom arises. Depression and unhappiness

### A Conceptual Model for Metadata-based Frameworks

2657 words - 11 pages Abstract. Recent frameworks employ the strategy to define a specific metadata schema for applications to use in their classes and programming elements, enabling framework behavior customization. Despite this technique is being widely used, there are not models, design patterns or development guidelines that aim to help in the creation of this kind of framework. This thesis proposes a conceptual model for metadata-based frameworks that has the

### Marketing Strategy For a Service-based Organization

2650 words - 11 pages directing a total system of marketing action to achieve predetermined objectives. The systems approach is essential for effective decision making, for the utilization of models in marketing, and for the application of computer technology. Systems analysis is a managerial breakthrough, somewhat akin to breakthroughs in various sciences, and has given rise to powerful concepts and tools of analysis. The systems approach is based on the work of Von

### How Effective are Small Group and Discussion Based Teaching Methods for Mathematical Success in Elementary Aged Students?

1236 words - 5 pages Small group and Discussion based learning have their differences and similarities. Small group teaching methods relates mainly to cooperative learning, which is, when small groups of students collaborate together to reach a common goal, though the students are working together, each individual student is responsible for knowing the material being discussed (Nattiv, 1994). Discussion based methods do not always include small groups, the “Whole

### Focus Group for a Research Study Regarding Table Usage

1155 words - 5 pages groups, etc. This could help determine what market is appropriate for what demographic, and how to extend it’s reach. In the first part of the term project, it was discussed that the PC market is in great decline, and tablet computers are dominating the market. We will use a focus group to determine if college students, a large population of PC users, would prefer to use a tablet for their studies. This will show us whether or not this is a

### A Knowledge -based Approach to Innovation An Application for Project- based Firms

1055 words - 4 pages knowledge depend on networks of relationships in a PBO. Knowledge-based perspective concentrates on building up capabilities during the implementation of projects. Networks are formed by knowledge flows through collaboration, sub contract and strategic alliances.#Knowledge, Networks and InnovationAccording to the Knowledge-based View (KBV), knowledge is of strategic importance and firm's competitive advantage lies in its ability to integrate the

### A Flexible Gene-Based Test for Genome-Wide Association Studies

1883 words - 8 pages Gene-based tests for association are increasingly being seen as a useful complement to genome-wide association studies (GWAS) [1]. A gene-based approach considers association between a trait and all markers (usually SNPs) within a gene rather than each marker individually. Depending on the underlying genetic architecture, gene-based approaches can be more powerful than traditional individual-SNP based GWAS. For example, if a gene contains more

### A New Non-Invasive test for Food Based Allergies

1590 words - 6 pages Table of Contents Prevalence/Problem 3 What is currently being done? 3 Types of invasive tests 4 Noninvasive tests 5 My solution 5 What’s next 5 References 6   A New Non-Invasive test for Food Based Allergies Prevalence/Problem Food allergy and intolerance is described as a wide range of adverse reactions to foods and in 2010 an expert panel, sponsored by the National Institute of Allergy and Infectious Diseases, published

### A Copula-Based EDA For a Class of Continuous Multiobjective Problems

1301 words - 6 pages A Copula-Based EDA For a Class of Continuous Multiobjective Problems 1 Introduction An optimisation problem consist of trying to find the optimal solution in a set of good solution, finding this optimal solution has a relation with the specific area of research problem, this kind of problem which have two or more objective function to reach are called multiobjective problem, those objectives are usually contradictory each others, the

### Community Group Process Analysis: How to Create a Safe Environment for the Public

1385 words - 6 pages on a personal and professional level. It would appear this group would be attractive to others and with its members. Group Dynamics Group Goals and Hidden Agendas The overall goals for the Board of Works and Safety is to create a safe environment for the public, manage matters as they arise for the local fire and police departments, and the board has a primary goal of maintaining a safe and sustainable infrastructure (personal communication

### Disaster Mitigation System based on Social Network as a tool for community self-relief

1171 words - 5 pages to set new ways to solve new events. This task can be reviewed, verified and rated by this group of users and by the system when it makes an appraisal of the past events. Once this parameters are established and verified the system will find the best users that match this require- ments. If we are requiring an skilled user during a disaster, the system will make the evaluation based on the previous mentioned characteristics (Current, status

## Similar Essays

### Undeniable Signature Scheme For A Group

2261 words - 10 pages Proposed Approach for Undeniable Signature for a group The concept of undeniable signatures is to be implemented upon the group of members to generate the Undeniable Group Signatures. This scheme would be based on the RSA problem. The underlying security assumption is based on the intractability of the factorization of the large integers in real time. In the proposed scheme, a group member can sign a document on behalf of the group without

### A Signature Based Approach Against Polymorphic Internet Worms

1967 words - 8 pages , Sep. 2004. A Trac Signature-based approach for InternetWorms 15 X. Yang, J. Lu , Y. Zhu and P. Wang, Simulation and Evaluation OF A New algorithm of Worm perception and Containment, Proceedings of the Seventh Inter- national Conference on Parallel and Distributed Com- puting, Taiwan, Dec. 2006, pp. 448-453. V. H. Berk, R.S. Gray, and G. Bakos, Using Sensor Networks and Data Fusion for Early perception of Ac- tive Worms

### Group Proposal: Develop A Proposal For A Group

1077 words - 4 pages --a wise, experienced, unemotional but empathic and caring counselor and a group of people who can relate.We are freer than we have been for centuries to dissolve an unhappy marriage. There are other factors associated with the increasing divorce rate. Many of these social-economic factors would be considered good, e.g. more equal education and job opportunities for women, higher incomes, fewer children, fewer religious restrictions, and general

### A Creative Group Proposal For Assisting Veterans

1936 words - 8 pages group treatment is particularly useful for combat-related PTSD because military training and combat operations are group experiences and traumatic experiences in the military typically are managed in the context of the group (Collie, 2006, p.2). Logically, a creative expressive based support group in necessary and beneficial to help veterans that are suffering form the debilitating disorder that uniquely affects them. Group Organization and