Shared-key signature and its application to anonymous authentication in ad hoc group

6Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We formalize the notion of shared-key signatures, which makes it possible to anonymously sign any message with verification by a shared common public key. Unlike group signatures, shared-key signatures require no group manager or other third party to help the group members to generate signing keys. Also unlike ring signatures, shared-key signatures have no special structure such as a ring and the signing and verification procedures are the same as those of the ordinary signatures. In addition, they can be easily transformed into interactive authentication protocols while the ring signatures cannot. A concrete construction of such signatures is proposed based on Weak Dependence Problem (WDP). Since WDP is NP-complete and many researchers believe that NPC problems are intractable even in the quantum computation model, our scheme may be used to sign the documents requiring a longer-term validity with anonymity. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Wu, Q., Chen, X., Wang, C., & Wang, Y. (2004). Shared-key signature and its application to anonymous authentication in ad hoc group. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3225, 330–341. https://doi.org/10.1007/978-3-540-30144-8_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free