Performance and Security of Group Signature in Wireless Networks

Joshua J. Tom, Prof Boniface. K. Alese, Dr. Aderonke F. Thompson, Dr. Nlerum P. Anebo

Abstract


A Group signature protocol is a cryptographic scheme that decouples a user identity and location from verification procedure during authentication. In a group signature scheme, a user is allowed to generate signatures on behalf of other group members but identity and location information of the signer is not known by a verifier. This ensures privacy, authentication and unlinkability of users. Although group signature is expensive to implement, its existential anonymity, non-repudiation and untraceablility properties make it attractive especially for resources-constrained devices in wireless network. A general group signature scheme usually contains six basic phases: setup (or key generation), join, message signing (or signature generation), signature verification, open and user revocation. In this paper, an evaluation of the performance of group signature based on three of the phases mentioned above is considered and its security in wireless networks examined. The key generation, signing and verification algorithms are implemented in Java 8. A proof of security of group signature by implication is also presented.


Keywords


Wireless network; authentication; security; anonymity; untraceability; group signature.

Full Text:

PDF

References


Chaum, D. and van Heyst, E. Group signatures. In D. W. Davies, editor, Advances in Cryptology, EUROCRYPT 1991 (Lecture Notes in Computer Science 547), pages 257–265. Springer-Verlag, April 1991. Brighton, U.K.

Khalique, A. Singh, K. Sood, S. ”Implementation of Elliptic Curve Digital Signature Algorithm”, May 2010.Web.http://www.ijcaonline.org/volume2/number2/pxc387876.pdf.

Blumenthal, Matt. ”Encryption: Strengths and Weaknesses of Public key Cryptography”, Web. http://www.csc.villanova.edu/_tway/courses/csc3990/f2007/csrs2007/01-pp1-7-MattBlumenthal.pdf.

Abdalla M., Warinschi B. (2004) On the Minimal Assumptions of Group Signature Schemes. In: Lopez J., Qing S., Okamoto E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg

Ateniese, G. Camenisch, J. Joye, M. and Tsudik, G. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270, Santa Barbara, CA, USA, Aug. 20-24, 2000. Springer-Verlag,Berlin, Germany.

Chen, L. and Pedersen, T. P. New group signature schemes. In A. D. Santis, editor, Advances in Cryptology, EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science, pages 171-181, Perugia, Italy, May 9-12, 1994. Springer-Verlag, Berlin, Germany.

Camenisch, J. Efficient and generalized group signatures. In W. Fumy, editor, Advances in Cryptology EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 465{479, Konstanz, Germany, May 11{15, 1997. Springer-Verlag, Berlin, Germany.

Bellare, M. Micciancio, D. and Warinschi, B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, Advances in Cryptology { EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614{629, Warsaw, Poland, May 4{8, 2003. Springer-Verlag, Berlin, Germany.

Kiayias, A. and Yung, M. Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/.

M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. Cryptology ePrint Archive, Report 2004/077, 2004. http://eprint.iacr.org/.

IEEE P1556 Working Group, VSC Project. Dedicated short range communications (DSRC), 2003

E. Brickell, J. Camenisch, and L. Chen. Direct Anonymous Attestation, Oct. 2004.

A. Lysyanskaya and Z. Ramzan. “Group blind digital signatures: A scalable solution to electronic cash”. In Proc. Financial Cryptography, 1998.

J. Camenisch. “Efficient anonymous fingerprinting with group signatures”. In ASIACRYPT 2000, vol. 1976 of LNCS, pp. 415{428. Springer Verlag, 2000.


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).