{"title":"A strong designated verifiable group signature scheme","authors":"S. Mohanty, B. Majhi, V. Iyer","doi":"10.1109/IMAC4S.2013.6526468","DOIUrl":null,"url":null,"abstract":"This paper presents a strong designated verifier group signature scheme, in which signature is generated by any member of the group and it is verified by only a specific receiver, called a designated verifier using the public parameters of the group and his own secret key. The verifier assumes that the signature indeed is from the group itself, not from any individual group member. In this scheme, anonymity of the signer is completely preserved. The verifier cannot link a signature to the signer. The scheme is secure as an adversary cannot verify the signature even if the secret key of the signer is compromised or leaked. Also, neither the group manager nor any member of the group can produce a valid signature on behalf of another member. Only in case of legal disputes, the group manager can disclose the identity of a group member who has signed a document. The major benefit of this scheme is that the length of the group signature is independent of number of group members and it remains unaffected if some members left the group or new members join the group. Security of the proposed scheme lies in the complexity of solving three computationally hard problems, namely, Computational Diffiee-Helmann (CDH) problem, Discrete Logarithm Problem (DLP) and Integer Factorization Problem (IFP). This scheme can be useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMAC4S.2013.6526468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper presents a strong designated verifier group signature scheme, in which signature is generated by any member of the group and it is verified by only a specific receiver, called a designated verifier using the public parameters of the group and his own secret key. The verifier assumes that the signature indeed is from the group itself, not from any individual group member. In this scheme, anonymity of the signer is completely preserved. The verifier cannot link a signature to the signer. The scheme is secure as an adversary cannot verify the signature even if the secret key of the signer is compromised or leaked. Also, neither the group manager nor any member of the group can produce a valid signature on behalf of another member. Only in case of legal disputes, the group manager can disclose the identity of a group member who has signed a document. The major benefit of this scheme is that the length of the group signature is independent of number of group members and it remains unaffected if some members left the group or new members join the group. Security of the proposed scheme lies in the complexity of solving three computationally hard problems, namely, Computational Diffiee-Helmann (CDH) problem, Discrete Logarithm Problem (DLP) and Integer Factorization Problem (IFP). This scheme can be useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.