20 research outputs found
ID-Based Digital Signatures with Security Enhanced Approach, Journal of Telecommunications and Information Technology, 2009, nr 4
In the paper the ID-based digital signatures with signer’s protection in case of the private key compromising is investigated. The proposed protocols have two main ingredients. First is the application of the credential system for the suitable verification key approval. Second is the application of the subliminal channel together with the interactive generation of the secret key, to obtain the increased resistance of the system against the powerful adversary. The particular interest was turned towards the significance of the deniable encryption in creation of the corresponding protocols
On oracle factoring of integers
We present an oracle factorisation algorithm which finds a nontrivial factor
of almost all squarefree positive integers based on the knowledge of the
number of points on certain elliptic curves in residue rings modulo
Multi-threshold signature, Journal of Telecommunications and Information Technology, 2008, nr 1
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature. This scheme protects the anonymity of signers in a way the group signature does – in exceptional circumstances the identities of signers may be revealed. Due to the new party – completer, in our scheme the threshold size may vary together with the message to be signed. The presented scheme is based on the RSA signature standard, however other signature standards might be applied to it as well
Simple Dynamic Threshold Decryption Based on CRT and RSA, Journal of Telecommunications and Information Technology, 2009, nr 2
In the paper we present a simple threshold decryption system based on the RSA cryptosystem. Our model avoids the application of the Shamir secret sharing protocol and is based only on the Chinese reminder theorem. The flexibility in the threshold level is attained due to the suitable preparation of the input data. The second part of the article describes a modification of the basic model, which admits the sender’s impact on the choice of the real receiver’s group
ID-based, proxy, threshold signature scheme
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed