Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2007.14-D.3.373

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce  

Sung, Soon-Hwa (충남대학교 차세대통신인력양성사업단)
Abstract
Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.
Keywords
Ring signature; Threshold ring signature; Ubiquitous electronic commerce; Integrity; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Li, T. Hwang and N. Lee, 'Remark on the threshold RSA signature scheme,' Advances in Cryptology-CRYPTO'93, Lecture Notes in Computer Science, Vol.773, pp.413-420, 1994   DOI   ScienceOn
2 E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad hoc groups,' http://www.di.ens.fr/~bresson/
3 M. Noar, 'Deniable ring authentication,' Advances of Cryptology-CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.481-498, 2002
4 R.L.Livest, A. Shamir and L. M. Adleman, 'A method for obtaining digital signatures and public key cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978   DOI   ScienceOn
5 National Institute of Standards and Technology(NIST), 'The digital signature standard, proposal and discussion,' Communications of the ACM, Vol.35, No.7, pp.36-34, 1992   DOI
6 L. Harn, 'Group oriented(t,n) threshold digital signature scheme and digital multisignature,' in IEE Proceedings of Computer and Digital Techniques, Vol.141, No.5, pp.307-313, 1994   DOI   ScienceOn
7 Y. Desmedt and Y. Frankel, 'Shared generation of authentication and signatures,' Advances in Cryptology-CRYPTO'91, pp.457-469, 1991
8 C. Li, T. Hwang and N. Lee, 'Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders,' Advances in Cryptology Proceedings of EUROCRYPT'94, pp.413-419, 1994
9 T. Hardjono and Y. Zheng, 'A practical digital multisignature scheme based on discrete logarithm,' Advances in Cryptology-Proceedings of Asiacrypto'92, pp.16-21, 1993
10 L. Ham and T. Kiesler, 'New scheme for digital multisignatures,' Electronics Letters, Vol.25, No.15, pp.1002-1003, 1989   DOI   ScienceOn
11 A. Shamir, 'How to share a secret,' Communications of the ACM, Vol.22, No.11, pp.612-613, 1979   DOI   ScienceOn
12 Wei-Bin Lee and Chin-Chen Chang, '(t,n) Threshold Digital Signature with Traceability Property,' Journal of Information Science and Engineering 15, pp.669-678, 1999
13 R. Rivest, A. Shamir, and Y. Tauman, 'How to leak a secret,' In Asiacypt'01, LNCS 2248, pp.552-565
14 E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad-hoc groups,' Advances of Cryptology-¬CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.465-480, 2002
15 M. Abe, M. Ohkubo, and K. Suzuki, '1-out of-n signatures from a variety of keys,' Advances of Cryptology-ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, Springer-Verlag, pp.415-432, 2002
16 J. Herranz and G. Saez, 'Forking lemmas in the ring signatures' scenario,' Cryptology ePrint Archive, April 2003