3 research outputs found
Performance and Security of Group Signature in Wireless Networks
A Group signature protocol is a cryptographic scheme that decouples a user identity and location from
verification procedure during authentication. In a group signature scheme, a user is allowed to generate
signatures on behalf of other group members but identity and location information of the signer is not known by
a verifier. This ensures privacy, authentication and unlinkability of users. Although group signature is expensive
to implement, its existential anonymity, non-repudiation and untraceablility properties make it attractive
especially for resources-constrained devices in wireless network. A general group signature scheme usually
contains six basic phases: setup (or key generation), join, message signing (or signature generation), signature
verification, open and user revocation. In this paper, an evaluation of the performance of group signature based
on three of the phases mentioned above is considered and its security in wireless networks examined. The key
generation, signing and verification algorithms are implemented in Java 8. A proof of security of group signature by implication is also presented
Some Lattices Attacks on DSA and ECDSA
In this paper, using the LLL reduction method and computing the
integral points of two classes of conics, we develop attacks on
DSA and ECDSA in case where the secret and the ephemeral key and
their modular inverse are quite small or quite large
Performance and Security of Group Signature in Wireless Networks
A Group signature protocol is a cryptographic scheme that decouples a user identity and location from verification procedure during authentication. In a group signature scheme, a user is allowed to generate signatures on behalf of other group members but identity and location information of the signer is not known by a verifier. This ensures privacy, authentication and unlinkability of users. Although group signature is expensive to implement, its existential anonymity, non-repudiation and untraceablility properties make it attractive especially for resources-constrained devices in wireless network. A general group signature scheme usually contains six basic phases: setup (or key generation), join, message signing (or signature generation), signature verification, open and user revocation. In this paper, an evaluation of the performance of group signature based on three of the phases mentioned above is considered and its security in wireless networks examined. The key generation, signing and verification algorithms are implemented in Java 8. A proof of security of group signature by implication is also presented