English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4242920      Online Users : 780
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/21650


    Title: A study on efficient group-oriented signature schemes for realistic application environment
    Authors: Chung, Y.-F., Chen, T.-L., Chen, T.-S., Chen, C.-S.
    Contributors: Department of Electrical Engineering, Tunghai University
    Keywords: Digital signature;Elliptic curve cryptosystem;Group signature;Ring signature;Signcryption;Threshold group signature
    Date: 2012
    Issue Date: 2013-05-15T09:03:44Z (UTC)
    Abstract: Rapid development of data processing systems has made digital signatures an essential application. A digital signature basically associates a signer with the message. Its important characteristics are easy verification, unforgeability and undeniability. However, conventional digital signature schemes generally consider only single signer situations; this is impractical, because the authorized signatory in the business world is generally composed of signatures of several people. Therefore, to enable co-signatories on a document, several group signature schemes are hereby proposed in this paper, including threshold group signature, anonymous ring signature, and group signature that incorporates ring signature technology. Since the aforementioned signature schemes are all based on Elliptic Curve Cryptosystem (ECC), they have short key size, low computation load, and little bandwidth requirement. Therefore, all the above schemes are considerably efficient. Finally, analyses are carried out to prove that the proposed schemes can withstand signature forgery attack and are signer undeniable, and thus meet the security requirements. ? 2012 ICIC International.
    Relation: International Journal of Innovative Computing, Information and Control 8 (4) , pp. 2713-2727
    Appears in Collections:[電機工程學系所] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML362View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback