manoj dr brau thesis
TRANSCRIPT
-
8/3/2019 Manoj DR BRAU Thesis
1/122
0
RSA Cryptosystem
ElGamal Cryptosystem
Messey - Omura Cryptosystem
Knapsack Cryptosystem
Construction of Knapsack Cryptosystem
Quadratic Residue Cryptosystem
Hybrid Cryptosystem: Diffie - Hellmans key Exchange
Digital Signatures
A Classification of Digital Signature Schemes
Digital Signature Schemes with Appendix
Digital Signature Schemes with Message Recovery
RSA Signature Scheme
Feige Fiat Shamir Signature scheme
ElGamal Digital Signature Scheme
The Digital Signature Algorithm
The Schnorr Signature Scheme
The ElGamal Scheme with Message Recovery
Nyberg Rueppel Digital Signature Scheme
Digital Signature with Additional Functionality
Multi-signature scheme
Group Signature
Threshold Signature Scheme
Undeniable Signature Scheme
Blind Signature Scheme
-
8/3/2019 Manoj DR BRAU Thesis
2/122
1
Proxy Signature Scheme
Directed Signature Scheme
Abstract of the Thesis
Introduction
A Directed Signature Scheme
Security of the Proposed Scheme
A Directed Signature with Threshold Verification
An Application to Threshold Cryptosystem
Introduction
A Directed Delegated Signature Scheme
Security of the Proposed Scheme
Remarks
IntroductionDirected Threshold Signature Scheme
Security of the Proposed Scheme
Remarks
Introduction
Threshold Signature Scheme with
Threshold Verification
Security of the Proposed scheme
Remarks
-
8/3/2019 Manoj DR BRAU Thesis
3/122
2
Introduction
Directed - Threshold Multi Signature Scheme
Security of the Proposed SchemeRemarks
Introduction
Directed - Threshold Multi Signature Scheme Without SDC
Security of the Proposed Scheme
Remarks
Introduction.
Generalized Directed - Threshold Multi - Signature Scheme
Security of the Proposed Scheme
Remarks.
!
-
8/3/2019 Manoj DR BRAU Thesis
4/122
3
A thesis submitted for the partial
fulfillment of the degree of
in
MATHEMATICS
by
!"#$
%#&'
-
8/3/2019 Manoj DR BRAU Thesis
5/122
-
8/3/2019 Manoj DR BRAU Thesis
6/122
5
**Declaration**
!"##!!$
-
8/3/2019 Manoj DR BRAU Thesis
7/122
6
DEPARTMENT OF MATHEMATICS
Institute of Basic Science
Dr. B.R. Ambedkar University
Khandari, Agra-282002
!"#$$%"& '!"#$"#"()"*
**
Certificate
**
A CRYPTOGRAPHIC
STUDY OF SOME DIGITAL SIGNATURE SCHEMES
&!'()!**+ ,-
,)-
Sunder Lal!"!"!"!"
-
8/3/2019 Manoj DR BRAU Thesis
8/122
7
**Acknowledgment**
I am grateful to my Supervisor Dr. Sunder Lal, Prof. & Head, Department of
Mathematics, Institute of Basic Science, Dr. B.R. Ambedkar University, Agra, who
spares his valuable time in guiding me for my research work. He encourages me always.
I am short in word to express his contribution to this thesis through criticism, suggestions
and discussions. My sincere thanks are to Dr. Sanjay Choudhary and Dr. Sanjeev
Sharma, both senior lectures in the Department of Mathematics, Institute of Basic
Science, Dr. B.R. Ambedkar University, Agra, for their kind suggestions.
I am deeply indebted to Dr. J.P. Arya, HOD, Department of Mathematics, D.A.V.
College Muzaffarnagar, who had laid the foundation of my M.Phil. degree and then
encouraged me for Ph.D. degree.
There is no word to express my feeling for my family members and relatives,
especially to my parent for their hidden cooperation and to my wife Chhaya for her
enthusiastic inspirations, round the clock cooperation and help me in many ways. Really,
it is not possible to express the love and affection to sweet and little daughter Aayushi
Raghuvanshi, who is the driver of my success, to make the path for my Ph.D. work.
I am thankful to all the faculty members and staff of Hindustan College of Science &
Technology, Farah Mathura, Ravindra Kumar (T&P Officer), Jagadeesh. G. (Lecturer,
Computer Science), Sri Gopal Sharma, Sri Sarvesh B. Singh for their kind cooperation in
this electronic age, through computer, printer etc. I am also thankful to my research
colleagues Ms. Meeta Gurmukh, Mr. Atul Churvedi, Mr. Anil Agarwal and Mr. Amit K
Awasthi for their result oriented discussion.
At last but not the least, my sincere thanks to the writers of the books and the
research papers, which, I have consulted during the course of my research work.
&!'()!**+ ,./
-
8/3/2019 Manoj DR BRAU Thesis
9/122
8
Chapter 0Introduction
-
8/3/2019 Manoj DR BRAU Thesis
10/122
9
# #$%# #$%# #$%# #$% & % & % ' &
%()$&*
!!!!
!!!!+&,,$%&-.%$&
(% & -&- , ,& /
& $,& - %% --%&
&-%%%%--&--&--&--&
Cryptography is the art or science of keeping
secrets secret. Cryptography is about secure
communication through insecure channels.
+&%%-%$&$&%--&&&
0%1-%-&&&-&%,
$ +& %- 23#4+5163#4+5163#4+5163#4+516,&
7% & 8& #$ # 9$$ # % ,& $ &
%--&% & 7 "
-%1&$&&-&+&7
,$ %- ,&%&&-% $
,--#-:$(
;0; ';0
-
8/3/2019 Manoj DR BRAU Thesis
11/122
10
';=;?@,&%,&%&,-@&
;=
-
8/3/2019 Manoj DR BRAU Thesis
12/122
11
%&%-&$D%&%$&-$%
'G
' ;:?
-
8/3/2019 Manoj DR BRAU Thesis
13/122
12
%%-%-,&$
%-%$%-$%-&&/
&, ,& & % %- & & ,
-*
"#"#"#"##$#$#$#$
####$$$$
%%%%
# # # # #### $ % $ % $ % $ % $ $ $ $ & & & &
# # # # ! # # ! # # ! # # ! # #$$$$
' ( # ' ( # ' ( # ' ( # $$$$%%%%
-
8/3/2019 Manoj DR BRAU Thesis
14/122
13
!)$*!)$*!)$*!)$*++++,-./,-./,-./,-./ $ $ $ $ ! ! ! ! & 0 & 0 & 0 & 0 1111 $$$$
2 #2 #2 #2 #
# 3 #3 #3 #3 $$$$
0.2. Public Key Cryptosystems
H-,&,%#%#-,
&)$@&@&@&@&G"G"G"G"--;:?
-
8/3/2019 Manoj DR BRAU Thesis
15/122
14
1111HHHH****M####HHHH****####M
H1111HHHH&HHHH
H%-$1111HHHHHHHH
H %& %-$&)$ HHHH
%-$1111HHHH
H%-$-1111HHHHHHHHH
%$&&--&%-1111HHHH%&$%
-$% ,&$ %- & %$ & - %- HHHH +&-$% %--&% & - , -
%- %- $%&
, & &%-
&&
+& & -- $ & & , %-$
%--,&%-%,&
&&%-%-
'&%-&&%%$%&
1$&&--$%-$%-$%-$%1H%-
----H%-@&&&--&$%%$&
-$%'%-$%&-$&
-$% % % & $%& %- %$
-
8/3/2019 Manoj DR BRAU Thesis
16/122
15
%$(5,&&&$%%$C+&
3333%-&17171717%-$%&C-$%
-$%/&&-$%-&
.&&&&--%/&,,&
5$,$--&,&-$% %-# &$
,&+&-%,,
$-&-$%1H%-&1H J#
&%-(#
%-&%-(#%&(%$,&H
"JH1H
B&$%%-&1H %%%H 1H
1H
$%H#-&&,,&
B%(%&&$B%(%&&$B%(%&&$B%(%&&$
1$,1$,1$,1$,
B,$%D&,&$$&$B,$%D&,&$$&$B,$%D&,&$$&$B,$%D&,&$$&$
1%-%-1%-%-1%-%-1%-%-
#$%%$,&-%&--#$%%$,&-%&--#$%%$,&-%&--#$%%$,&-%&--,&&,&&,&&,&&
$%&$%&$%&$%&
B-$B-$B-$B-$
3,A,-$%%-%,*
RSA Cryptosystem
';:??&--,&,&-%%$%$
& -$% %--&* 3& 5
N$-&%&-$%$A-$%%-
,&%& % 3 %- +& -% & $
,&%& -- --%& % & 3& %
%& ' ;:?? & , , ,& $%%N& &
%&,--%%%$&%$&
-E8FO
-
8/3/2019 Manoj DR BRAU Thesis
17/122
-
8/3/2019 Manoj DR BRAU Thesis
18/122
17
'& 17 %& & $---
1$%/SS-P;%-$
-$%$J Ag -',,&$&,
%&&- B,%&$
,&%%&&-+&$ &
-,&&-&&%&-
&-(
Messey - Omura Cryptosystem
+&%-&%$%&
&$&$--$%--B,%&$%&,-
$%&&-J;' % ,& 3 %- & & $ - & &' % ,& 3 %- & & $ - & &' % ,& 3 %- & & $ - & &' % ,& 3 %- & & $ - & &
$%$%$%$%-$&&&-$&&&-$&&&-$&&&B,%&$,&%&&
$&&$@$&$-&
,&%&&-
+&&,,*
+&$%-$ Aem -&$
+& $ %-$ & thBe -, & $ & & %
$&$ BAeem -&$
B,&$--&$,&&% ABA deem
-+&$$$ Bem -+&$&$
&$
+&$--&%$&
Knapsack Cryptosystem
' ;:?= G " E?;F -- -$% %-,&%&
$-&A%H-%-7KL-
-
8/3/2019 Manoj DR BRAU Thesis
19/122
18
>AJ;NNNNN;,&K;L
&$%&&
=
1
0
k
i
J>$%&(
-% % & H-% - & $-% H-%
- ' & )$% & % & &' & )$% & % & &' & )$% & % & &' & )$% & % & &
--&%&--&%&--&%&--&%&&&$&&&$&&&$&&&$&+
& $-% H-%- @ &
,& & $, & & > +&
, & & H-% - $-%
)$%A$->*
3@J>DJ
3,&D;%&(%&&)$C
$,&%$%&&@3J;
-%@@DJ@T%-
'@J$'@T&T@&&
$&-
Construction of Knapsack Cryptosystem
1%&$%&$-%A$-K;NA;
,&%&&
=
1
0
k
i
-SS(-
,%$%&)$% U;-CJ;N
& % $/ J C J C U A; U A UNU J
;NP;/)$CU
=
1
0
k
i
+&%%&
-S&&-
&%-$&$-%J%-$&
A$-K,L,J+&$-&$
-
8/3/2019 Manoj DR BRAU Thesis
20/122
19
$-$&&A$-,+&%- H1 JK, ,; ,A;L+&
%-HJKL
3,&,-(AJA;AN;
$,&%-&K,L&%-$#JJ
=
1
0
k
i
,
&+&&%&-$>#
3%#
=
1
0
k
i
,
=
1
0
k
i
,&>J
=
1
0
k
i
",
$ & % & &> S
=
1
0
k
i
=
1
0
k
i
S %&
%$%$)$
Quadratic Residue Cryptosystem
+-,--$$3&$E
-
8/3/2019 Manoj DR BRAU Thesis
21/122
20
- & $%& %-& & - %- &%
%$
+&%-%%&-(%$,&
,%J-)&%%-$,$%&&-U)J;
"%%-$&$(;&)$&$(&&
)$(&%&$ (.%-&
,&BU;&$(B%-$&,$
%&(&&-(
JE-U;0FB-;
JE)U;0FB);
$J(B--
J(B))(J)$U-
Hybrid Cryptosystem: Diffie Hellmans Key Exchange System
+&--$%%-,@&&
%%%-'%
& , - %- (- %& +& &
$&%-"E0F
1$%%-%$%-$%
%- $ & (%& & % % &
%%-
'&% &$$%-$I
-$% +&& $%- & %$,&&-
+&-%$,-%/&&$
&%&$&&%%$%
%-,&$&$$-&&&%&&&$%&&$
,$-(%&
#,$,&,&$-%,&&
$-,&---S-&,&%&
-
8/3/2019 Manoj DR BRAU Thesis
22/122
21
-$%3%&$%$$&-+&
,,*
+&$%&%S-%-$J-"
&$
+&$%&%S-%-$J-"
&$
+&$%-$J-%-$J-
'&,&&$&$-%%+&
%$%%-+&%-,'&
$%WIWI&&%$%-$D$&$
",$%&$+&&%--%&
,&&,&-$%%--&
%%%--&&$-
%--&% ,&%& - %% $&% &
%$%
0.3. Digital Signatures
@$&%$%-%%$&%,&,,&$%%$%%%,
-%&-%$$%%--&H#H#H#H#-%&
$%& -%$ &$& $ %& ' & &
$&%&%%$&
&,$$$%&33&%-
&$%-&Thus, a$%&-
&$&%&,&$&%&
$%&$%&$%&$%&&-%--&%
H#H#H#H#$%$%$&&
&&&&,$&%$--
$%&%&,*
-
8/3/2019 Manoj DR BRAU Thesis
23/122
-
8/3/2019 Manoj DR BRAU Thesis
24/122
23
$%&,&%)$&
-$&%&
$ %& ,& --( %--&% && $%&3173%&$%&$%&$%&
-, &)$&%&'&
$%&$%-$%$X3%
$-%G%-%,&%&
%$
1%&$%%3&K3*L"3
P--G&3%
%&( G&&&&*GMG&/G&
G3%-%%&&&$-%3
%--->G&Y3K$L$%&&
>XXJ
=
otherwiseflase
smSiftruekA
,
,)(, **,
XG&X3/&XJ&G>&-$%&
% % %$% $%& &
%-$,&$,&%3&
+&$
%&%3%-$XJ&
XJ3X"&A,&&$%
+&-X&$&$
+&$
+&$&-$%&$%-$XJ&
$J>XX
+&$%%-&$$J$
-
8/3/2019 Manoj DR BRAU Thesis
25/122
24
!"
#!"$
%&
&-%3&$%%-$
&%-%>&$%%-$
'&$%-$$&
GX3$%&&
>XXJ$,&XJ&
+&P,&&$%& -%%%P
&&$%
$,&%&&$&&%
%&$+&%&$$&
-
8/3/2019 Manoj DR BRAU Thesis
26/122
25
-,&)$&%&+&
3BP$--$%&$%&
+&$
%&%3%-$XJZXJ3X"ZA--GG3
+&$X&$&,&%&
&$
+&$
+&$&-$%&$%-$XJ>X
XGZ&Z'X GZ&D%&$
+&$%&X%-$ZP;X
'("%)
%&
G $ %& ,& % --
(&,&$%&,&--(
--&
+&$%Z-$%,ZP;
%-$
$%&,&%%%
$%&,&--(-&&&
&&&&$
-
8/3/2019 Manoj DR BRAU Thesis
27/122
26
+& 3 $ %& , & $ %& ,&
%3 $ %& &-%%
%&)$ +& -% -% $ -%
%-&(-%&%&QJ K;NP;L,&J-)&
-$%,%&-$
+G
$%-$XJZ
--&%&%-$XJX
+&$X&$&$&
+&$X%&
$--&-$%&$%-$
XJX
>&XGZ/D%&$
%&JZP;X
A A3&$ %& $ %& ,& --(
+&%&)$P,&&$%&*K;LXMK;L(
- "K;L &AA&
K;LX&AA&'&$%&
1%&$%-%D
QX,&DJ;NJ-)
%-$DJDP
+&A$-D&-$%&A$-D&%&
$
+&$
-
8/3/2019 Manoj DR BRAU Thesis
28/122
27
%$QX%-$$J
%-$JDJ&[$/%&DK;L
%-$J=
k
j
e
jjs
1
I$&
+&$$
%-$,J=
k
j
e
jjv
1
%-$\J&[$
%%-&$J\
&3$%&$$&$$J-)
'&%$%,$&--)
&%-$%%&$
'$$ ;::; & 3B '$ 3 +%& B'3+
--$&3+&3&%3
'%3'3;=
-
8/3/2019 Manoj DR BRAU Thesis
29/122
28
Ax ; Ax -P%-$ Ay J x
g -
" Ax &- Ay &-$%&$
+&&$
%%;-P,&-P;J;
%-$J-P;-P;
%-$JP;K&P Ax L-P;
I$&
+&$$
&;-P;/&D%&$
%-$;J Ay -
%-$&J&-
%%-&$;J
!
&&,&,-
; -J-$$5,&8;5;05$-
-
8/3/2019 Manoj DR BRAU Thesis
30/122
29
+&--)&-$%+&$I-$%&
- Ay Ax -%+%$
&&$
%%-$A;
)
%-$J-)
%-$JP;K&U Ax L)
+&-&$&$&,$
$%&,$
+&$&%-
&;-P;/;-P;/&D%&$
computes w = s 1
modp and h (m).
computes u1 = w. h (m) mod q and u2 = r w mod q.
computes v = 1ug 2u
Ay mod q.
%%-&$J
+&%$&3,%$%
&-.&&- Q-X/&&&
&-&%%%$$-)
+& 3%& $ %& ,A, & 17 $
%&+&$)$&&$% &*K;LMQ)'&%&
&&$
%&%Ak Q)
%-$ Ar J& Ak - AS J Ak Ax Ar -
+&- Ar AS &$&$&+&
$&%-%&%&)$
-
8/3/2019 Manoj DR BRAU Thesis
31/122
30
Ar J& AS Ar -
The ElGamal Scheme with Message Recovery
+&17$%&$%&,&
--('%BBBBAAAA$--$$--$$--$$--$17$
%&,&%&&&$&&%%&$
"#
+& & BA $-- $ & 3
&-%G3JQ-X--&$-%
3JQ-YQ))-)-P;
+$
%-$XJZ
%%Q)X%-$JP-
%-$JX-J(U)
+&-&$&$&
+&$$
&Q-XQ)X/D%&$
%-$JP-XJ-
&XGZ/'X GZ&D%&$
%&X%-$ZP;X
Digital Signature with Additional Functionality
+&$%&,&%&-$%
$ $&% & -- ' & $
%&%$%&+&3+&17%
-
8/3/2019 Manoj DR BRAU Thesis
32/122
31
,&-%%-%%&&$,&%&&%&
-
%% & $ -%$ - & C &
$,3,A,$%&,&
$%%,*
Multi-Signature Scheme
'%%--%&$&-)$
%$ @& & )$ $ , % &
$ $A$ E00;0000===;F +& $ $$
,& %- $ %&)$,&%& $&C &
-+&$$$%%%,&%&&$-
Group Signature Scheme
#$---,&%&&$-$&C
& %$ & & $- +& - $ % $-
$ E;8;=F7$- $ , $%&
,&
.&$-%&
+&%&$%&$-$
+&%&$%,&%&&$-
&
'%-$&&$-&$
$&%&
Threshold Signature Scheme
$&$%&$B&&
$ ,& $- % & &
C% (-&-% %,&%&
)$$&-3$%&-%%$-
-
8/3/2019 Manoj DR BRAU Thesis
33/122
32
&-$)$$&$
%&&,&&
&&&$%&E;;0?8:F,&%&
& && %-&& %-&& %-&& %- ' && %& % &
$---$%&&%$&%,&
%&%+&$--%&
$- %% %$ % + $& , &
%$&&%&$3&
&&%&%&$%H $
$%&,&$%%-%$%H$%$P;
$&$&%3&I%&5
-+--P;%&Q)$%&&JH1%&$-$%
iu %
&iu B,$&&%%$%&%HJ
-&&$
",$-%&&$&C$ $%
&&J;N
'&&$%&$$-&&
&$-%$-$$%&,&&
%%&%&&$,&$&
& $ && %& $ ,% '
&& %& ,& && % %$ & %
-&&&&$'&%&
%$&-&$
-%&
'&)$&&&$&$
*
J quu
uuf
ji
jt
ijj
t
i
i mod)(,11
==
-
8/3/2019 Manoj DR BRAU Thesis
34/122
33
;+&$-%WHW%WW2%&6;
N$%&&
+& $-$ % -$% ,& , WI
%&^
@&,P;,%& -
$-$
% +&$-%%&%&
$-$-$
'&&C&$-$)$&C
$$
$%&$-$%-%&$
--
0 +&$-&&-+&%&
$&$-%&&
8 +&-$$-$%$
%$&&
Undeniable Signature Scheme
$$&, $ -
%- (% +& -- % $ $ $%&
& $% -$% ,& & %-
$ B& $$ & --%
#%%-%&,%&
(-%%'$%&%&-
%%-%$%--$%$-
+&%-$%&%&$$&&$%
, $ & %- &$ $ &, & &
%,&$&$I%
&$$$E?;;0;
-
8/3/2019 Manoj DR BRAU Thesis
35/122
34
& - & $ $ $
$%,&&&-&
Blind Signature Scheme
& & % $ %& $ %&
E;;?8:;;F,P--%,&&
+&% & &-%
,&%& $ &$% %-$I
$-&%&%&%-&-%
,&&&$%,&+&-$-
$-&&
& $/ &% $ % & ,& &
$%&&--%,& & & %$
, & & %- % -
$3-%%%&-%+&
- %% %& --% ,& & -
$ & % - @& 3 -
-$$%,&%&-,&$
+&,$&--%
$%&-%)$&,%-*
$%&&
$%_`,$%&&
`3_J3
$%_ %$% ` $ $%_
Proxy Signature Scheme
& % -%% & , '
%-&&&&-$&%-
& & %-' & --, %- $ &
-
8/3/2019 Manoj DR BRAU Thesis
36/122
35
-$- %- - & C & - ,& &
$&$&
' & %% , % & )$ -( $ %&
E0=
-
8/3/2019 Manoj DR BRAU Thesis
37/122
36
+& -- , & & %&- +& (
%$-&%%&%&-
Chapter 1
' & %&-, -- %$ %& % $%& %$ %& % $%& %$
--% + & $ & $ & -$% &
$%$%&,&&$%&%
&$%)$$&$%%
%&%&$+&$%-&
&$&,&%
B( --% && % %$ --
% $ %& ,& && %% $ %& ,& && %% $ %& ,& && %% $ %& ,& && % +& %& --%,&C%$
&&C $%&,&$"
$$-7 $% & &
$$P; $% & $ ' & %&
& & $ % 3#3#3#3# +& %$ - %
& (& % %&& &&$+&
%&-%
B(&&%-%$+&&%-
$$,&&%&C+&C
& -$% +& % $ & $
C$%&,& $)$&
$ ,& P ; $ , & & % %
$&
Chapter 2
#$,&&&$%W#I
II,&-,&-(WI+&
-(%&$&&$
% $ ,& & B7.I &- ,&%& % '3
%&%$- +& &- & #G. ,& & -
-
8/3/2019 Manoj DR BRAU Thesis
38/122
37
-" $%$ $%%&&
-#,%&$&R&%&%A$-&R&,
%%&%,&$&&-$#"'>-
& & %$ & & - &-
&B7.%&4@&-G%$%
'3-#&-&
%%-&$&%&-,%&
-( $ %& ,& % $ %& --
%$%&
'&$%&&,-&+&
-& A +& -& -( $ %& %
-&,'&-&&&-,&-('&%&&
& % % & -( " &
&%&-(&$&-($@&$
, & % & & -( % &
$&
+& % -& A ' & % ,
$C & -%-$ & -& ' & -& & -(
&%$&
+&$&%&$%)$
$ & & & $ % % %&% & &
$'%&-%&$%-
&&$&$&C,-%
Chapter 3
, & %$ & && $ %& ' $ &$%&
- ", ,& & &
C)$&--%--
& $ , -- % && $ %&% && $ %&% && $ %&% && $ %& ' &
$%&7$-$$,&%&
-
8/3/2019 Manoj DR BRAU Thesis
39/122
38
%&$$+&$%
&$&%-&-#,&
%B%%&%&&$,&$&&-
$ %$%,$ & (% $ &$
%3#,&%&&$-%-&%&
7 5" $ 7 % @ $ &
(% %# ,& %%- $ %&
$&$$-"1&&&$-&)$$&,&
&$-%+&&%$)$$
&& % , @ &$ & & %
%,&
Chapter 4
'$&&-",
,& & C & C
)$ & -- % -- '& % &
$ % & % &
&-+&%&--- &&$%&&&$%&&&$%&&&$%&,&,&,&,&
&&%&&%&&%&&%
# & C 3 &
C)$&--$"3
$-73$&C3.&&&
&$-,&$ $%&,
& & $ % $" $
$- 7 $ & C & &&
%%&$-$-
'&%&-,$&$&&&C 3&%$ % #+# & $-% - &
,$-&%&'%-$,&
$-3 +#- & % $ - &
$D$3%+#%%&%&&$,&
-
8/3/2019 Manoj DR BRAU Thesis
40/122
39
&-&$%+#%%&&-$
&%
Chapter 5
'&&%&'&&%&'&&%&'&&%&,& &&%%$&%
-&&&&$'&%&
%$&-&$
- % & $,& & && %&
--&-%
'$$%&'$$%&'$$%&'$$%& &$$&
&&$$&,&&&-
& $$ $% -$ &&$ %&$# &$,&
$- $ ,$ & $$ +&
&$-$-$&&-$%%
@&%%&&
&%&$-",&&,
,&&$ %&$-%$ &&
&-'&%&$$%&%&-
&,&&&$%&
'&%&-,%&%$%&&&
$ ,& $ $ %& -- $ %&
%%%%AAAA&&$&&$&&$&&$AAAA$%&$%&$%&$%&'&%&
+& $ 3#$ 3#$ 3#$ 3# & & $- %
&&I%&
+&%#%#%#%#,&&-%%
%& - $ & -$% $- $ $ $ $ $
%%,&%%,&%%,&%%,&
%$%-&
&$'%-%&
-
8/3/2019 Manoj DR BRAU Thesis
41/122
40
&&%%$%%-%$%&
-3(-&,%&&%&%
%&$-%
Chapter 6G && $ %& )$ $ 3#$3#$3#$3# & $-
% % & $- ,&%& & -
$+&(%$%&%$-/&
,--
--%&-%,&%&%
%-$&$-
3%&$%%-$%$
-&%%&-
+&-;::"$%%&
17$%&,&%&)$$3#,&%&)$$3#,&%&)$$3#,&%&)$$3#'&%&
%&,3#$&%&%&
$'& %&-,--%%%% AAAA&&&&&$&$&$&$ AAAA$%&$%&$%&$%&
,&$ 3#,&$ 3#,&$ 3#,&$ 3# ' & %& %& &&, 3# &
%$&%-%&&&&&&&%&-$%-@$&&
%%%%####,&&-%%%&
- $ & -$% $- $ B& & B& & B& & B& &
-%&&$%,&&-%&&$%,&&-%&&$%,&&-%&&$%,##'&%&
1%& && , 3#1%& && , 3#1%& && , 3#1%& && , 3# & %
$&%-%&&&&
+& % % % % #### ,& & -
%% %& - $ & -$% $-
$$%%,&&$%%,&&$%%,&&$%%,##
%$%-&
& $ ' % - % &
-
8/3/2019 Manoj DR BRAU Thesis
42/122
41
Chapter 7
@&&&$%)$&--
-% $ ' & , % & %
$ %&,& && $A$ %&-- && $ %&$ &7C%7C%7C%7C%AAAA+&&G$+&&G$+&&G$+&&G$AAAA
3$ 3%&3$ 3%&3$ 3%&3$ 3%& +& $ & C %A && $ A
$ %& & & % &&A $ P
$%&-$&%&-(%-&&$-$
% generated only by some specified subsets of members according to the signature
policy.
' & &$% & $ % &$% & $ %
C3-&)$&---%%
$& && - &
&-%$&%%
&-%&$,--7C%7C%7C%7C%AAAA&&&&&&&&
$$$$AAAA$%&$%&$%&$%&
573&&C3"3&
-% $ +& $- $ % &
%-&"3@&73&
-%$
$%$%,$&&$&$%$&$%$&$%$&$%
3#3#3#3#&&&&&$-%&&I%&
% % % % #### ,& & - %% %&
-$&-$%$-$'&%&
+&3#3#3#3#$-%%-%&
&&
+&%%%%####,&&-%%
%& - $ & -$% $- $ $$ $ $
%%,&&%%,&&%%,&&%%,##
-
8/3/2019 Manoj DR BRAU Thesis
43/122
42
%$%-&
&$'%-%&
&&%%$%%-%$%
&$-%-&%&
The thesis ends with a list of references (papers, books and websites) that have been
consulted from time to time while completing the work.
-
8/3/2019 Manoj DR BRAU Thesis
44/122
43
Chapter 1
A Directed Signature Scheme
-
8/3/2019 Manoj DR BRAU Thesis
45/122
44
A Directed Signature Scheme
1.1. Introduction
,& %$ $ & % & % $ %&
%$%&$&$,&&&
$ % ' & %&-, -- % $ %& % $ %& % $ %& % $ %&
%$ --% ' & %& & - % %&% &
$,&&&-$%
1.2. A Directed Signature Scheme
3$--&$,$&&
%%%&$%-&$
&-#,&%+&%-%
,
1.2.1. Signature Generation by A
-%1a
K 2a
K Q)%-$
@J 2aK ->J 1aK 2aK -
"&-$%&$%
A,&&$%&%-$%$J& 1aK
%%-$ AS J 1aK U Ax Ar )" Ax &-&
K AS @>L&$&
1.2.2. Signature Verification by B
&- Bx %-$J>@ Bx -%
Ar J&
-
8/3/2019 Manoj DR BRAU Thesis
46/122
45
%&%&%$% AS ?
Ar -$'&
&K AS @>L$
1.2.3. Proof of Validity by B to C
-% KQ)%-$@#J K ->#J#K-
#
#$@#>#-%@>%&%&$$
& % +& $ %-%, $A
%;
1.3. Security Discussions
'&$A%,&%$&%$--%3$%3$%3$%3$3%&3%&3%&3%&
#&% Ax 1aK % $ Ar &
)$AS J 1aK U Ax Ar )O
"&$$,-&+&$)$
%-$%%&% Ax
1aK %$ Ar &)$
#-&O
-&%,
1K 2K Q)%%$
@J 2K ->J 1K 2K -J& 1K
$,&$,&% Ax %$ AS
&%)$ AS ?
E Ar F-
%%%%#$K AS @>L&)$
AS ?
E Ar F-O
-
8/3/2019 Manoj DR BRAU Thesis
47/122
46
%&%-$&&&$ Ar
$%& & Ar J & ) .$ %-$ & AS
)$&%&-+&$&%,
$%%$
Illustration
+$&%&-J)J;;J+&%-$%
$,
3%-$%3%-$%3%-$%3%-$%
0 ;
?
#
-
8/3/2019 Manoj DR BRAU Thesis
48/122
47
E:?F@$&$&$-7--
iRx -$%
iRy
+&%&%&,-
1.4.1. Signature Generation by A
-%1a
K 2a
K Q)%-$
@J 2aK ->J 1aK -
A,&&$%&%-$%$
J&> AS J 1aK U Ax Ar )
" Ax &-&
%%-(J1a
K U;(UNA;(A;),&1a
K J
%-$-$%$iR
v %&&$-7
iRv J
iRu 2a
i
K
Ry -
"iR
y -$%iR
u &-$%$%,&%&$
&$-7
K AS @n
iRiv 1}{ = L&$-7&$
1.4.2. Signature Verification by the Organization R
$" $ $-7 $ % &
$@$ & & % ,&%&%%-
%-$ %& $ " & $ +&
-%,
1%&$"%&R&%&iR
u JiR
v iRx
RW -
1%&$"&R&&,
-
8/3/2019 Manoj DR BRAU Thesis
49/122
48
iRMS J
iRu q
uu
u
ji
i
RR
Rt
ijj
mod,1
=
%1%&$"$&R&&,iR
MS %%$&-
$iR
R J iRMS )&%
+&%%-$J pRk
i
Rimod
1
=
%J&)
+&%%&%&%$% AS ?
ArAy -$
'&&KK AS @n
iRiv 1}{ = L$&
+&--%&&&,%&%%*
+&$3#,&&&$
%& & $ 3# & & %$
-$&%&%&$&
+&%&%$-%&
%&$
+&%&%$-%&&
+&%$&%$-%&A
%+&(&
+& % %& & && $ &
%$
+&)$&$&$-7---$%-
iRx
iRy
1.5. Application to Threshold Cryptosystem
+&&%- %P%-+& $$,&
-%)$&%&-+&C&
-
8/3/2019 Manoj DR BRAU Thesis
50/122
49
-$%+&%$&$C$%&
,&$%&-%$,& P;
$,&&%%$&%
44 E;F - &%%- &&
%-+&I,&%-,*
+&$-%(/$$- &$%
%&$-%%&$&
+&%$-(+&%&
$ & $- %& A$- %$
-%)$D$$-I%&%%
.$%$%&%$&&%-$&,3$--$,%-&
&$$-7$&$%-%
& +& %- %- H & %
$-7 % % > -% +& %
KK AS @ %n
iRiv 1}{ = L&$-7,&%J1HHJ&>
% % & %- H J & +& & %
%-&H%J
+& -- && %- & & , &
%-&%%-
+& $- % ( % %& %& $&
%$%
+&($-+&&
&%-
$ % %-& ( %& $- ,& %$-%
-
8/3/2019 Manoj DR BRAU Thesis
51/122
50
Chapter 2
A Directed Delegated Signature Scheme
-
8/3/2019 Manoj DR BRAU Thesis
52/122
51
A Directed-Delegated Signature Scheme
2.1 Introduction
&%-%%&,'&%%,
% & )$ -( $ %&& &$&
,&%& %- % -
$%&%$E0F,&%&&%-
,'&%&-%%
,& & - &% & $- & $
+&&&%-,&$
&%$%&&&%-%&$&
,&&&-&-(
. & & & & $ ,& & &
$%%$$#$,&
, , & %- & &
$ % & $ , % & -( $
%&,&%$%&%%%%AAAA$$$$
%&%&%&%&
'&%&-,--%P$%&,&%&&
,-&+&-&A+&-&
-($%&%-&
, +& % -& A ' &
%,$C&-%-$&-&
' & %&- , $ --% & -- %%%%AAAA
$ %& $ %& $ %& $ %& % % $& ,&
$$&$%%&&+
%%&$#,%%&%%&%&
-
8/3/2019 Manoj DR BRAU Thesis
53/122
52
$,&$&&-$#%-&&$
&-4,&%
2.2. A Directed Delegated Signature Scheme
# $ ,& & B7.I &- ,&%& % '3%&%$- +& &- & #G. ,& & -
-" $ %$ $ %% & &
-#,%&$&R&%&%A$-&R&,
%% & % ,&$ & &- $ # "'>
- & & %$ & & -
&-&B7.%&4@&-G%
$%'3-#&-&
%%-
+&$$%&-%A$
%&"&%#%%&$%-
&-4,&%3%%$%
,& & &- % # , % & & %
%%&,&$&$%+&,
(-&,-(%$%&%-$
%$%
C&%&%$---"
$$&,-%%&-
$-)-%-P;Q-,&)
,&&$%&
2.2.1.Signature Key Delegation by A
;%Ak Q)%-$J Ak -
%aQ)%-$Ja-
'Q)X&&,-
%-$J(U Ak ),
0%-$3JUa)%&%3J-
-
8/3/2019 Manoj DR BRAU Thesis
54/122
53
')$&%%-WI$
B, &&- - &-$% & %&%$- -#
---%-#+&$
%&,-%
2.2.2. Signature Generation by B for C
-%1b
K 2b
K Q)%-$
@J 21 bb KK -Q%J# 1bK -
%-$ Br J&Q%@ BS J 2bK 3)
%KB
S @B
r L##G.I$
2.2..3. Signature Verification by C
#%-$bJ BS Ay Br @-Q%Jb Cx -
#%&%& Br J&Q%@&$
2.2.4. Proof of Validity by C to Y
#KAS
@
A
r
bL4
4%&% Ar J&Q@)
'&&4-&-%/&,&(-
%#C,&-4&bQ#J#,
4%&$Q-%-$,Jbu v -,#
#%&aQ-%-$cJ, -Jc Bx -
4
4$,&%%&,Jbu v -
#a4,&%&&%&
cJbu v U-JQ#u # v U -
-
8/3/2019 Manoj DR BRAU Thesis
55/122
54
2.3. Security Discussions
'&%,%$-%
'&-(&&&%%&&
&R&$&R&%&%
+& $ & - & (% $ & - +&
&,,-
$&-%$&%+&&--&
% I %&% %
I
# 2bK 3%$-(&)$
BS J 2bK 3)O
"& $ $,- ,+&$ )$
%-$%%&%
2bK 3
%%%%#-&O
-&%,
1iK
2iK Q)$,&$,&%-a
%$ -( $ 3 BS &
%)$
Q%J BS Ay Br @ Cx - Br J&Q%@
#$K BS @ Br L$&)$
bJ BS Ay Br @-O
+ %-$ & BS & )$ )$ &
%&-'% *S K *S
@ Br L&%%-$b XJE*S Ay Br @F
-QXJbX Bx -%%&%
-
8/3/2019 Manoj DR BRAU Thesis
56/122
55
Br J&QX@%&
Illustration
@$&%&$-+-J)J;;J
-
8/3/2019 Manoj DR BRAU Thesis
57/122
56
2.4. Remarks
'&%&-,&%$%A$%&,&%&
$$ &%,&& $% '
&%&&$%#&$%&$%
-%B % %&% &$ ,&$& %A- +&
%-&&$,&%
@&-%$%$%&%$%&,&%&
% & - "% & %$ & %&
& & %& % & 3% &
,&I % ,&%&
%$&&%&&%&
-
8/3/2019 Manoj DR BRAU Thesis
58/122
57
Chapter 3
Directed Threshold Signature Scheme
-
8/3/2019 Manoj DR BRAU Thesis
59/122
58
Directed Threshold Signature Scheme
3.1. Introduction
'$&&C
)$&--%--'&%&$
& % & & - %
(-&-%%,&%&)$&$
& - 3$%& -% %$ - & -
$)$$&$%&
& ,& & $ +&&+&&+&&+&& $$$$
, & -+& &&$ %& $
&-+&&$%&%%-&&
%--&$%E;F';::;
EF--&&&$%&&3
$-
'&%&-,--%%%%AAAA&&$%&&&$%&&&$%&&&$%&
3&I&&$%&E:=F3%&I$%&E:0F
3.2. Directed -Threshold Signature Scheme
57$-$$,&%& %
& $ $ +&$ % &
$ & % - & - # ,&
%B%%&%&&$,&$&&-
$ %$%,$ & (% $ &$
%3#,&%&&$-%-&%&
7 5" $ 7 % @ $ &(% %# ,& %%- $ %&
$&$$-"1&&&$-&)$$&,&
&$-%+& &%$)$$
&&%,
-
8/3/2019 Manoj DR BRAU Thesis
60/122
59
+&%&%&,-
3.2.1. Group Secret Key and Secret Shares Generation
3#%&$--$%--)%,&&
$%&3#%-
(JU;(UNA;(A;),&J Gx J
"Gx &%&$-7
3#%-$&$--$% Gy Gy J-
%3#%-$%&%&&$-7
J$)"$&-$%$%,&$&$-7
3#%&$%
3.2.2. Signature Generation by any tUsers
'$&$-$&
&$$,-*
1%&% 1iK 2iK Q)%-$
,J 2iK 1iK -CJ By 2iK -
1%& , - C % %&
".%,C%-$
Q@
@J qwHi
i mod
QJ qz
Hi
i mod
J&Q@)
%1%&&R&&G3J quu
u
ji
jt
ijj
mod,1
=
-
8/3/2019 Manoj DR BRAU Thesis
61/122
60
1%& $ &R&&G3 1i
K
%%$&-$J1i
K PG3)
1%& &R&-$&%#
,&%%&-$-$%&$-$
3J=
t
i ,1
)
#K3@L$&$-7&
%-$bJES G
y R @F-QJb Bx -
%&%&$J&Q@)
3.2.4. Proof of Validity By B to Any Third Party C
+&-&-%$%A0
3.3. Security Discussions
,, %$ %$-% & --%%%% AAAA +&& 3$+&& 3$+&& 3$+&& 3$
3%&3%&3%&3%&
'-&$-%&$--$%
Gy OB%$&%$%&-
# &% & 7&-$%$ $ OB
%$%%-
(c). Can one retrieve the secret shares vi ,integer1i
K and partial signature si , from the
equation si =
1iK P
MS
i.R mod q. ?
"&$$,-,+&$)$
%-$%%&%&
1i
K -$7
-
8/3/2019 Manoj DR BRAU Thesis
62/122
61
(d). Can the designated combiner DCretrieve the group secret key f(0) or any partial
information from the equation, S = =
t
i ,1
si mod q ?
+&%-$
#-"O
-&& %,
1i
K 2i
K Q)%,C$,&$,&
%&%$-$&
%)$
QJES G
y R @F Bx -,&3J=
t
i ,1
)
#$K3@L&,)$
bJES Gy R @F-O
+%-$3 &)$&%&
-'% *S K *S @QL&
%,$%-$
bXJE*S
Gy R @F-QXJbX Bx -%&%
Br =?
&QX@
+&%%&&&$
#&&%%$%$%&-
(O
%%&,)$
(J quu
uxuf
ji
jt
ijj
t
i
i mod)(,11
==
-
8/3/2019 Manoj DR BRAU Thesis
63/122
62
&%- (%%$%,&&,
%&$7
3 C & && , %& & &
- &%$%$$&,$
&%&%-,&%&,%$$
+& % , & %$ $ %& & & &
$ $ & & %$ & $
& & && $", ,&- $ &
$%%-%-$&%
Illustration
$,$&$$&.$$$
# 1 ,$ % & %
$&$,&%-$%- Bx JJJJ
-
8/3/2019 Manoj DR BRAU Thesis
64/122
63
+&$%1a
K J2a
K J?%-$ 1w J 1z J;
+&$%1f
K J82f
K J:%-$ 4w J0 4z J:
% & & $ 1w 4w 1z 4z -$%
&$&% %&.% 1w 4w 1z 4z
%&$"%-$&-$%@J;QJ;
-
8/3/2019 Manoj DR BRAU Thesis
65/122
64
$%&$-%&,$
&$-%$$%%$
'&%##,&%%&-$&@
&$&&%%,&$
% %-$ & & $ ) ' ) - & &
%%$ & (- -f ),&%& - +&
- &5 - %%$ &&,,
, (%- ,& ) J ,&%& % , # &
$,& =
t
ijj
ji uu,1
)( )%-'&%&,
$ &$-% =
t
ijjji uu,1 )( )+& -
% & -) $ %& - $ &
%$
%&&$&-%$&
,&-+&, Q$%
- & $ 3$ % & - &
%-%C,&-&$
-
8/3/2019 Manoj DR BRAU Thesis
66/122
65
Chapter 4
Threshold Signature Scheme with Threshold
Verification
-
8/3/2019 Manoj DR BRAU Thesis
67/122
66
Threshold Signature Scheme with
Threshold Verification
4.1. Introduction
'$&&-",
,& & C & C
)$ & -- % -- '& % &
$ % & % &&-+&%&---+&&$%&+&&$%&+&&$%&+&&$%&,&,&,&,&
&&%&&%&&%&&%
4.2. Threshold Signature Scheme with Threshold
Verification
#&C3&C
)$&--$"3
$-73$&C3
. & & & & $- , & $
$%&,&&$%$"
$$-7$&C&
&&%%&$-$-
@$&&%&C3 Sx &-$%
Sy,&
SyJ
Sxg -
,&Sx
Q)
3&C
-
-Rx Ry - Rx -$% Ry J
Rxg -'
$&&C-- Ax Ay ,& Ax % Ay J
xg --$%
-
8/3/2019 Manoj DR BRAU Thesis
68/122
67
@$&$&&&C3&%$
%#+#&$-%-&,$-&
%&+&%&%&,-
4.2.1.Group Secret Key and Secret Shares Generation for theOrganization S
#+#%&$--$%--)%,
&&$%+#%-3(&$-73
3(JU;(UNA;(A;),&J Sx J3
#+#%-$&$--$% Sy J3-
(c). #+#%KQ)%-$-$%$@J K -
#+#%-$-$%$iS
v %&&$-73
iSv J3
iSu
K
Siy -
"iS
y -$%iS
u &-$%$%,&%&$&
$-73
#+#K iSv @L%&$&$-73&$&-$%%&
4.2.2. Group Secret Key and Secret Shares Generation for the
Organization R
#+#%-(&$-7
(JU;(UNA;(A;),&J Rx J
#+#%-$&$--$% Ry J-
%#+#%-$-$%$iR
v %&&$-7
iR
v JiR
u K
Riy -
-
8/3/2019 Manoj DR BRAU Thesis
69/122
68
"iR
y -$%iR
u &-$%$%,&%&$
&$-7
#+#KiR
v @L%&$&$-7&$&-$%%&
4.2.3.Signature Generation by any tUsers
'"3$&C 3$,&
&C&&$&
&,-*
1%&$"3%1i
K 2i
K Q)%-$
$J 2iK -J 1iK -,J 1iK Ry 2iK -
1%&$%$,-$%%&$"3
.%$,%&"3%-$&-$%
3>3@3&&$3
3J quSHi
i mod
>3J qvSHi
i mod
@3J qwSHi
i mod 3J&>3)
%1%&$"3%&R&%&3iS
u JiS
v iSx
W -
1%&$"3&R&&,iS
MS J3iS
u quu
u
ji
j
SS
St
ijj
mod,1
=
$ &R& &,iS
MS %& $ "3 %-$ &R&
-$J 1iK U iSMS 3)
1%&$ "3 &R&- $ +#,& -$%
$-$33J=
t
i ,1
)
-
8/3/2019 Manoj DR BRAU Thesis
70/122
69
#+#K333@3L&%%%%####CCCC
$&$-3&
4.2.4. Signature Verification by the Organization R
$"$$-7%&$@
$ & & % % % % #### % &% &% &% &
&$-&$-&$-&$-7777&&&C&&&C&&&C&&&C,&%%-
%-$ %&$ " & $ +&
-%,
1%&$"%&R&%&iR
u JiR
v iRx
W -
1%&$"&R&&,iR
MS JiR
u quu
u
ji
i
RR
R
k
ijj
mod,1
=
%1%&$"&&,iR
MS
#%-$J=
k
i
iRMS
SSUW
1
. )%
3J&)
#%&%&%$% SS ?
SR
Sy -$'&
&K333@3L$&
4.3. Security Discussions
' & $A% , & %$ & %$ -% -- +&&+&&+&&+&&
3$3%&,&&&%3$3%&,&&&%3$3%&,&&&%3$3%&,&&&%",&%$-
%$&%$%%$$
#&CI% Sx Rx &$--$%
Sy Ry -%O
+& %$ % & -B % &
% Sx Rx % 3 &%%
-+#.&&&$&-$% Sy Ry
-
8/3/2019 Manoj DR BRAU Thesis
71/122
70
&%Sx Rx %$&%$
%&-
# &% & 3 iS
u 73 &
)$iS
v J3iS
u KSiy -O
B %$ 3 %%- H
%%+#3%&
%&iR
u 7&)$
iRv J
iRu
K
Riy -
(c). # & % & 3 iS
u 73 &
)$3iS
u JiS
v iSx
W -O
.&$%%&%&3iS
u %$3
%%-iS
x %&$733
%&%&iR
u 7&)$
iR
u JiR
v iRx
W -
#&&,iS
MS 1i
K &&&$3
-$73&)$
J1i
K UiS
MS 3)O
+&%-%-$
%%&iS
MS 1i
K &&&$3-$73
#+#-&)$
33J=
t
i ,1
)O
.$ ,$ %-$ #+#
-
8/3/2019 Manoj DR BRAU Thesis
72/122
71
#-"3O
-&& "3%
, 1i
K 2i
K Q) %$ , $,&$
, & % & 3 iSu %$ -
$&%)$
33J=
t
i ,1
) SS ?
SR
Sy -
# $ K33 3 @3 L & , )$
SS SRSy -O
%&%-$&&&$
3$%&&3J&)
.$ %-$ & SS )$ & %
&-.&&&&%% SS
&$3&&)$
SS SRSy -
",%%&A,--&&&$% &)$
-+&$&%,$%%$
&&&&&%%$%$%&-3(O
%%&)$3(J quu
uxuf
jSiS
jSt
ijj
t
iiSS
mod)(,11
==
&%
-3(%%$%,&&, %&
3 iSu 73 3C&&&,%&
& &%$&%-3+&%
&, , & %$ $ %& & & &
$ $ & & %$ & $
&&&&$
-
8/3/2019 Manoj DR BRAU Thesis
73/122
72
Illustration
$ 3$-- =SG ? =SH 0 =RG 51
31
iS
y iS
x
iSu
3iS
u iS
v
P3; ? ; = 0
P3 ? ; : 0
P3 = ;0 = =
P30
;= ;
-
8/3/2019 Manoj DR BRAU Thesis
74/122
73
>51
31iR
y iR
x iR
u iR
u iR
v
P; : ;8 ;; ; ;0
P 0 : 8 : 8
P ? ;; = ; ;
-
8/3/2019 Manoj DR BRAU Thesis
75/122
74
%3R
u J;%-$3R
MS J0
%0%4R
u J;8%-$4R
MS J;;
8%5R
u J;%-$5R
MS J:
-
8/3/2019 Manoj DR BRAU Thesis
76/122
75
Chapter 5
Directed-Threshold Multi-Signature Scheme
-
8/3/2019 Manoj DR BRAU Thesis
77/122
76
Directed-Threshold Multi-Signature Scheme
5.1. Introduction
'&&%&'&&%&'&&%&'&&%&,& &&%%$&%-&&&&$'&%&
%$&-&$
- % & $ ,& & &&
%&--&-%
'$$%&'$$%&'$$%&'$$%& &$$&
&&$$&,&&&-
& $$ $% -$
&&$ %&$# &$,&
$- $ ,$ & $$ +&
&$-$-$&&-$%%
@&%%&&
&%&$-$&&,,&&
$ % & $- %$ & &
&-'&%&$$%&%&-
&,&&&$%&
.&&&&$,&&
&$%)$&--%
--#&,--$%&
%A+&&G$A3$3%&
5.2. Directed - Threshold Multi - Signature Scheme
' & %&- , % & && $&& $&& $&& $
%&$$%&$$%&$$%&$$%&%&%&%&,&%$%&,&%$%&,&%$%&,&%$%&--,-$%&%& %%%%AAAA+&&G$+&&G$+&&G$+&&G$AAAA3$3$3$3$
3%&3%&3%&3%&
$%$%,$&&$&$%$&$%$&$%$&$%
3#3#3#3#,&%&&$-%%&&&
-
8/3/2019 Manoj DR BRAU Thesis
78/122
77
% %% %#### ,& & - %% %&
-$&-$%$-$
+&%&%&,-
5.2.1.Group Secret Key and Secret Shares Generation for the
Organization S
3#3#3#3#%&$--$%--)%,
&&$%&3#%-
3(JU;(UNA;(A;),&J Sx J3
3#3#3#3#%-$&$--$% Sy J3-
(c). SDC randomly selects K Zq and computes a public value W = g K mod p.
3#3#3#3#%HQ)%-$JEHU3iS
u F)
""""iS
u &-$%$%,&%&$&-$%$%,&%&$&-$%$%,&%&$&-$%$%,&%&$&$-&$-&$-&$-77773333
3#%-$-$%$iS
v %&&$-73
iSv J
K
Siy -
""""iS
y &-$%$%,&%&$&-$%$%,&%&$&-$%$%,&%&$&-$%$%,&%&$&$-&$-&$-&$-77773333
3#KiS
v @L%&$&$-73&$&-$%%&
3#%-$-$%$
J ilg -J iKg -
-
8/3/2019 Manoj DR BRAU Thesis
79/122
78
5.2.2. Partial Signature Generation By Any t Users and
Verification
'&C3$
--- Rx Ry +&&$&&
,-
1%&$"3%1i
K 2i
K Q)%-$
$J 2iK -J 1iK -,J 1iK Ry 2iK -
1%&$$,-$%%%&"3
.%$,%&"3%-$&-$%
3>3@3&&$3
3J quSHi
i mod
>3J qvSHi
i mod
@3JJJJ qwSHi
i mod
3J&>3)
%1%&$"3%&R&%&J iSviS
x
W -
1%&$"3&R&&,iS
MS J quu
u
ji
j
SS
St
ijj
mod,1
=
1%&$"3$&R&&,iS
MS %-$$
J1i
K UiS
MS 3)
1%&"3
&-$###
+###%&%&%$% is ?
S
ijSHj jSiS
iS
R
quu
u
im
,
mod-
-$ 3'&%$%&&&-
$3&&
-
8/3/2019 Manoj DR BRAU Thesis
80/122
79
5.2.3. Group Signature Generation
####%%-$&$-$33J=
t
i ,1
)%
&-$
####K333@3L$&$-3&
5.2.4. Signature Verification by R
+&&$-$K333@3 L&&&&
&R&%&R&%&R&%&R&% Rx
+&%-$%$1
1J
S
ijSHjjSi
S
jS
Hi
quu
u
in
mod0
, -
+&%%&$3
J@3 Rx
SU -3J&
%+&$&%%$% SS ?
1 SRSy ) -%&%&
&$'&%%$%&&&$-$K33
3@3L$&C3&
5.2.5.Proof of Validity By R to any third Party C
%-$bJ3 Rx -Jb@3-
K1333bL#
% #%3 J & $&,%%$%%&%&
&$
SS ?
1 SRSy ) -
'&-&-%/&,&(-
-
8/3/2019 Manoj DR BRAU Thesis
81/122
80
C,&-#& SUbJ Ry ,
+&-&%&$%A0
5.3. Security Discussions
' & $A% , & %$ & %$ -% --%%%% AAAA&&&&&&&&PPPP $$ %&$$ %&$$ %&$$ %& " , & %$ -
%$&%$%%$$
#&% Sx J3&$--$% Sy O
+& %$ % & -B % &
% Sx %3 &%%-&
3#.&&&$&-$%S
y &%
Sx %$&%$%&-
#&%&3iS
u 73&)$
iSv J3
iSu
K
Siy -O
B%$ 3 %% -H
%%&3#
%%%%#&%&3iS
u 73&)$
3iS
u JiS
v iSx
W -O
.&$%%&%&3iS
u %$3
%%-iS
x %&$73
(d). # & &,iS
MS 1i
K 3 -
$73&)$J 1iK U iSMS 3)O
'%-$%%&iS
MS 1i
K 3
-$73
-
8/3/2019 Manoj DR BRAU Thesis
82/122
81
(e). #&%#&-&
)$3J=
t
i ,1
)O
.$&%-$#
#-$"O
- $ "3 % ,
1i
K 2i
K Q)%$ ,$,&$,
& % & 3 iS
u 3 %$ -
$&%)$
is
?
S
ijSHj jSiS
iSR
quu
u
im
,
mod
-
#$K333@3L&,)$
SS ?
1 SRSy ) -O
%&%-$&&&$
3$%&&3J&)
.$ %-$ & SS )$ & %
&-.&&&&%%3 SS
&$&&)$
SS ?
1 SRSy ) -
", %% & -- & && $% & )$
-+&$&%,$%%$
&&&&&%%$%$%&-3(O
%%&)$
3(J quu
uxuf
jSiS
jSt
ijj
t
iiS
mod)(,11
==
-
8/3/2019 Manoj DR BRAU Thesis
83/122
82
&%-3%%$%,&&, %
&3iS
u 73
$$--%&&%&73%&H
,&%& , & $ 3# & %$% & - 3 ( %$ &&
&H&-$%",&%$
&%&-+&$&&%
%-%$%&-3(-&,%&
3 C & && ,%& & &
&%%$%&-3(
Illustration$$-- =SG ? =SH 8-J0?)JJ8
*+"*"./
3#%-3(J;U;=(0 Sx J; Sy J;51
31
3%
ix
$%
iy
3%
iK
3%
3iS
u
3%
il
$%
im
$%
in
$%
iv
P3; ; ;
-
8/3/2019 Manoj DR BRAU Thesis
84/122
83
%3#%-$&%-$%%&-$%$%&
&$-73&,&
*,
'$330383
-
8/3/2019 Manoj DR BRAU Thesis
85/122
84
#%-$$-$33JK;0=L$&
$-3&
$",
+&%-$%$1J;=
+&%%&$J
-
8/3/2019 Manoj DR BRAU Thesis
86/122
85
%$%-&
& $ ' % - % &
&&%%$%%-%$%
&-3(-&,%&&%&
%%&$-%
-
8/3/2019 Manoj DR BRAU Thesis
87/122
86
Chapter 6
Directed-Threshold Multi-Signature Scheme withoutSDC
-
8/3/2019 Manoj DR BRAU Thesis
88/122
87
Directed-Threshold Multi-Signature
Scheme without SDC
6.1. Introduction
G && $ %& )$ $3#$3#$3#$3#& $-
% % & $- ,&%& & -
$+&(%$%& % $-/&
,--
--%&-%,&%&%
%-$&$-
3%&$%%-$%$
-&%%&-
+ & - ;:: " $% %&
157$%&,&%&)$$3#E0
-
8/3/2019 Manoj DR BRAU Thesis
89/122
88
%1%& 73%P;&- (
%iS
u Q)-$%
1%&73%-$-$--$% iy J-
+&$--$%Sy Sy J SGi
iy -
1%& 73,3#"%% &D Q)
%-$&%$D-$%$DDD
DJE&DUiS
u F)
DJijlg -DJ
ijhg -
1%&73%-$-$%$iS
v %&D &
$-73ijS
v JD KSjy -
"jS
y &-$%%,&%&$D&$-73
&1%&73ijS
v %&D &$&-$%%&
6.2.2. Partial Signature Generation by any t Members and
Verification
'&C$
--- Rx Ry +&&$&&
,-
1%&"3%1i
K 2i
K Q)%-$
$J 2iK -J 1iK -,J 1iK Ry 2iK -
1%&$,-$%%%&
"3.%$ ,%&"3%-$&
-$%3>3@3&&$3
3J quSHi
i mod
>3J qvSHi
i mod
-
8/3/2019 Manoj DR BRAU Thesis
90/122
-
8/3/2019 Manoj DR BRAU Thesis
91/122
90
J@3 Rx
SU -3J&>3
%+&$&%$% SS ?
1 SR
Sy ) -%&%&
&$'&%$%&&&$-$K333
@3L$&C3&
6.2.5. Proof of Validity by R to any third Party C
+&-&-%%88
6.3. Security Discussions'&$A%,&%$&%$-%--%&"
, & %$ - % &, & & %
$%%$&
'-&-%73O+& %$ % & -B % &
- $- -$% iy % & % %
-&.&&&$&-$%S
y
&-%%$
iy J- Sy J SGi
iy -
'-&%&D&)$
DJE&DUiS
u F)O
B%$ &%%- &D
%%&
%'-&%&D&)$
DJ ijl
g -O
B%$&%$%&-
'-&%&D&)$
ijSv JD KSjy -O
B%$H%%%
'-&%&D&)$
DJjiS
v iSx
W -O
-
8/3/2019 Manoj DR BRAU Thesis
92/122
91
.&$%%&%& DDDD%$iS
x %&
$
#&&,iS
MS &)$
iSMS J SS HjGjjil
,
#)O
'-%%&&,iS
MS &)$%$
DDDD%&&$
' - & & % # & -
&)$33J SHi
)O
.$&%-$#
&'-&%-$"O
- $ "3 % ,
1i
K 2i
K Q)%$ ,$,&$,
&%&D3 %$-$
&%)$ is ?
S
SS
i
R
HJGj
C
jii my
,-
' - & % $ K33 3 @3 L &
,)$ SS ?
1 SR
Sy ) -O
%&%-$&&&$
3$%&&3 J &)$%-$& SS
)$ & % & -. & & & &
%%3SS &$&
&$%)$",%%&--
& && $% & )$ - +&$ & % ,
$%%$
-
8/3/2019 Manoj DR BRAU Thesis
93/122
92
Illustration$3$-- =SG ? =SH 0-J0?)JJHJ;;@J;
*+"*"
& $ %-$ &% -$% $,&%& &
,
>51
31
3%
(
3%
$%
$%
iy
3%
iSx
$%
iSy
A3; ?U;( ? : 8 : ?
A3 :U;;( : ; ? ;; 0
A3 ;0U=( ;0 ;8 ;0 ;
-
8/3/2019 Manoj DR BRAU Thesis
94/122
93
A3&,
>51
31
3%
&D
3%
D
$%
D
$%
D
$%
D
P3; ; ;0 ;0
-
8/3/2019 Manoj DR BRAU Thesis
95/122
94
A38&,
>51
31
3%
&8D
3%
8D
$%
8D
$%
8D
$%
8D
P3;
-
8/3/2019 Manoj DR BRAU Thesis
96/122
95
*,
'$3303
-
8/3/2019 Manoj DR BRAU Thesis
97/122
96
+&%$%&&$-$K;
-
8/3/2019 Manoj DR BRAU Thesis
98/122
97
Chapter 7
The Generalized Directed Threshold Multi Signature
Scheme
-
8/3/2019 Manoj DR BRAU Thesis
99/122
98
The Generalized Directed-Threshold
Multi-Signature Scheme
7.1. Introduction
@&&&$%@&&&$%@&&&$%@&&&$%)$&--
-% $ ' & ' & ' & ' & , % & %, % & %, % & %, % & %
$%&,&&&$$%&,&&&$$%&,&&&$$%&,&&&$AAAA$%&-- &&$%& -- &&$%&-- &&$%& -- &&
$%&$ & $%&$ & $%&$ & $%&$ &7C%A+&&G$A
3$ 3%& +& $ & C %+& $ & C %+& $ & C %+& $ & C %AAAA &&&&& $& $& $& $ AAAA
$ %& & & % &&$ %& & & % &&$ %& & & % &&$ %& & & % &&AAAA $$$$ PPPP
$%&-$&%&-(%-&&$-$$%&-$&%&-(%-&&$-$$%&-$&%&-(%-&&$-$$%&-$&%&-(%-&&$-$
% -% $ %% &% -% $ %% &% -% $ %% &% -% $ %% &
$-%$-%$-%$-%
7.2. Generalized Directed - Threshold Multi - Signature Scheme
' & & $ % & $ % & $ % & $ %
C3-&)$&---%%
$& && - &
&-%$&%%
&-%&$,--7C%7C%7C%7C%AAAA&&&&&&&&
$$$$AAAA$$$$%&%&%&%&
573&&C3"3&
-% $ +& $- $ % &
%-&"3@&73&
-%$
$%$%,$&&$&$%$&$%$&$%$&$%
3#&3#&3#&3#&&$-%&&I%&
% % % % #### ,& & - %% %&
-
8/3/2019 Manoj DR BRAU Thesis
100/122
99
-$&-$%$-$+&%&%&
,-
7.2.1.Group Public Key and Secret Shares Generation Phase
3#3#3#3#%&$--$%--)%,&&
$%&3#%$-% Sx Q)%-$&$-
-$%Sy Sy J Sx -
3#3#3#3#-$%$iS
u Q)%$Q) 73
%3#3#3#3#%$%&-3(%&-%$"3
73 =SH
3(J Sx qux
ux
u
xk
u
ux
S iJS j
j
iS j
j
Hi Hj S
S
S
i
Hj S
Smod
(
(.
)0(
)(
,
+
,& Sx J33 iSu J "3
3#3#3#3#%&-$%$SH
u Q)%&-%$"373$%&
& SH
uiS
u 73%-$&-%%%>H
>HJ
SHj jSSH
jS
SHa uu
uuf
g)(
)0().(
-
3#3#3#3#% KQ)-$&$@J K -
3#3#3#3#%-$&%& 73J)(
Si
S
HS
H
uu
u
)
3#3#3#3#-$&&-$%$ iSv 73
J il -iS
v J KSiy -
""""iS
y &-$%%,&%&$&-$%%,&%&$&-$%%,&%&$&-$%%,&%&$&$-&$-&$-&$-77773333
-
8/3/2019 Manoj DR BRAU Thesis
101/122
100
#00 +
+)
+&%%&&-%$$-&
'&-%$"3--- Rx Ry +&&$&&,-
% 1%&$"3%1i
K 2i
K Q)%-$
$J 2iK -J 1iK -,J 1iK Ry 2iK -
1%&$$,-$%%%&"3
.%$,%& "3%-$&-$%
3>3@3&&$3
3J quSHi
i mod
>3J qvSHi
i mod
@3JJJJ qwSHi
i mod
3J&>3)
%1%&$"3%&R&%&JiS
v iSx
W -
1%&$"3&R&&,iS
MS J quu
u
ji
j
SS
St
ijj
mod,1
=
1%& $ "3 $ &R& &, %-$ & -
$J1i
K UiS
MS 3)
1%&"3&-$&%%%%####
+###&-$3&%$%
is ?
S
ijSHj jSiS
jS
R
quu
u
im
,
mod
-
-
8/3/2019 Manoj DR BRAU Thesis
102/122
101
'&%$%&&&-$ 3&&
7.2.3.Group Signature Generation
####%%-$&$-$33 J SHi
)%&
-$
",&$&&%",&$&&%",&$&&%",&$&&%%,&&%,&&%,&&%,&&
####
####K333@3L$&$-$-$-$-3333&&&&
7.2.4. Signature verification by R
+&&$-$K333@3 L&&&&
&R&%&R&%&R&%&R&% Rx +&$A%%&,-
+&%%&$3
J@3 Rx
SU -3J&
+& $ & $- -$% Sy & %- -%%
%>H%&%&%$% SR
KV SS
?
SR
Sy -
&&$
' & %$%& & & $-$ K33 3 @3 L
$&C3&
7.2.5.Proof of validity by R to any third party C
+&-&-%%88
7.3. Security Discussions' & $A% , %$ & %$ -% -- 7C 7C 7C 7C
%%%% AAAA &&&&&&&&PPPP $$ %&$$ %&$$ %&$$ %& " , %$ -
%$&,&&%$%%$$
#&%#&%#&%#&%%%%%JJJJ3333&$--$%&$--$%&$--$%&$--$% Sy OOOO
-
8/3/2019 Manoj DR BRAU Thesis
103/122
102
+& %$ % & -B % &
% % % 3 & % %
-.&&&$&-$%S
y %&
%%%$&%$%&-
#&%&%&%&%& 77773333&)$&)$&)$&)$
iSv JJJJ
K
Siy ----OOOO
B%$H%%&3#
%#&%&%#&%&%#&%&%#&%& 77773333&)$&)$&)$&)$
JJJJiS
v iSx
W ----OOOO
.&$%%&%&%$iS
x %&
$73
# & &, # & &, # & &, # & &,iS
MS 1i
K 3 3 3 3 - - - -
$$$$77773333&)$&)$&)$&)$JJJJ1i
K UUUUiS
MS 3333))))OOOO
'%-$%%&iS
MS 1i
K 3
-$73
(e). Can the designated combiner DCretrieve the any partial information from the
equation, SS = SHi
si mod q ?
.$&%-$####
#-$#-$#-$#-$""""OOOO
- $ "3 % ,
1i
K 2i
K Q)%$ ,$,&$,
&%&3 %$-$
&%)$
-
8/3/2019 Manoj DR BRAU Thesis
104/122
103
is ?
S
ijSHj jSiS
jS
R
quu
u
im
,
mod
-
# $ K # $ K # $ K # $ K33333333 3333 @@@@3333 L & , )$L & , )$L & , )$L & , )$
SR
KV SS
?
SR
Sy ----
%&%-$&&&$
3$%&&3 J & ).$%-$& SS
)$ & % & -. & & & &
%%3 SS &$&
&)$ SR
KV SS
?
SRSy -
",%%&--&&&$%&)$-
+&$&%,$%%$
& # & && # && # & -% $ -% $ -% $ -% $""""3 3 3 3 77773333 %- % & %- % & %- % & %- % &
----3333((((OOOO
+&%- 3%%$%,&&,U;
- )(,ii SSS
ufu @& & -% $ %-
%$%&-3&-%$ =SH
",%&(%& )(SHS
uf >H%$
&%&-+&$&&%
%-%$%&-3(-&,%&
Illustration
+& , $ $-- $ %& -%% -
3$-- =SG 3;333038 =SH 3;338-J0?)JJ
-
8/3/2019 Manoj DR BRAU Thesis
105/122
104
3#3#3#3#%KJ-$&$@J$
3; 3 3 30 38
iSu ;; : ;0 = ;?
= ;0 ; 8 ;
3#3#3#3#%$%-3(J(U8(U;?(U;=-%$"3
3#3#3#3#%&SH
u J;-%$"3%-$>HJ
3#3#3#3#%-$&%-$%%&-$%$%&
&$-73&,&,
+
'&-%$ =SH 3;338
- - Rx J ; Ry J ;= & & $ & &
,-
3;%11
K J?21
K J:%-$$;J;51
31
3%
ix
$%
iy
3%
$%
iSu
3%
il
$%
im
$%
iSv
P3; 8 ; = ;; ; ? ;0
P3 ;8 ;0 :
-
8/3/2019 Manoj DR BRAU Thesis
106/122
105
3%13
K J823
K J;;%-$$J?J;,J;
%38%15
K J:25
K J?%-$$8J;8J,8J;=
1%&$%-$&-$%3J?>3J;?@3333JJJJ3J=
3;%&R&%&;J;%-$1S
MS J;;J;:
3%&R&%&J;%-$3S
MS J;
-
8/3/2019 Manoj DR BRAU Thesis
107/122
106
#%3J?%&%&%%$%=
-
8/3/2019 Manoj DR BRAU Thesis
108/122
107
Appendix
3$&---$&R$-$%*3$&---$&R$-$%*3$&---$&R$-$%*3$&---$&R$-$%*
--$&*--$&*--$&*--$&*
%& ' In South East
Asian Journal of Mathematics and Mathematical
Science2 (1), !"#$%
(& In the
proceeding of National conference on Information
Security,Sponsored by DRDO,!!$&'!"$
-$-$-$-$-$%*-$%*-$%*-$%*
%& Communicated toAligarh
Math Bulletin.
(&
Communicated to J. of Applied and Pure
Mathematics, New Delhi.
)& ' Communicated to J.
of Natural Science Grukhul Khagri University
Haridwar.
*& 'Communicated to GANIT SANDESH, J. of Rajasthan Ganit
Parishad.
+&
Manuscript.
-
8/3/2019 Manoj DR BRAU Thesis
109/122
108
References
-
8/3/2019 Manoj DR BRAU Thesis
110/122
109
'
1. Adleman L.M., Pomerance C.and Rumely R.S. (1983). On distinguishing prime from the
composite numbers, Annals of Mathematics - 117, p.p.173-206.
2. Bellare M. and Michali S. (1988). How to sign given any trapdoor function, Proceeding of20th
STOC-ACM, p.p. 32-42.
3. Biehl I., Buchmann, J. A., Meyer, B., Thiel, C. and Thiel, C. (1994). Tools for proving zero
knowledge, Advances in Cryptology -EuroCrypt - 94, Springer Verlag, p.p. 356-365.
4. Blakley G.R. (1979). Safeguarding cryptographic keys, Proceeding, AFIPS 1979 Nat. Computer
conference - 48, p.p. 313-317.
5. Blake I.F., Van Oorschot P.C. and S.Vanstone. (1986). Complexity issues for public key
cryptography, Performance limits in communication, Theory and Practice, NATO ASI Series
E: Applied Science - 142, p.p. 75 97.
6. Blum L., Blum M. and Shub M. (1986). A Simple unpredictable pseudorandom number
generator, SIAM Journal on Computing - 15 (2), p.p. 364-383.
7. Boyar J., Chaum D., Damgard I. and Pederson T. (1990). Convertible undeniable signatures,
Advances in Cryptology Crypto - 90, Springer Verlag, LNCS # 537, p.p.189-205.
8. Boyd C. (1986). Digital multi-signature, In Cryptography and Coding. Editors, Beker H.J. and
Piper F. C., Clarendon Press, London, p.p. 241 246.
9. Burmester M. V. D., Desmedt Y., Piper F. and Walker M. (1989). A general zero knowledge
scheme, Advance in Cryptology- Eurocrypt - 89, Springer Verlag, p.p. 122-133.
10. Camenish J.L., Piveteare J.M. and Stadler M.A. (1994). Blind signature based on discrete
logarithm problem, Advance in Cryptology-Eurocrypt - 94, Springer Verlag, p.p. 428-432.
11. Chang C.C., Jan J.K. and Kowng H.C. (1997). A digital signature scheme based upon the
theory of Quadric Residues, Cryptologia - 21 (1), p.p. 55- 69.
12. Chaum D. (1982). Blind signature for untraceable payments, Advances in Cryptology Crypto
- 82, Springer Verlag, p.p. 199-203.
-
8/3/2019 Manoj DR BRAU Thesis
111/122
110
13. Chaum D. and Van Autwerpan H. (1989). Undeniable signatures, Advance in Cryptology-
Eurocrypt - 89, Springer Verlag, p.p. 212-216.
14. Chaum D. (1990). Zero knowledge undeniable signatures, Advance in Cryptology-Eurocrypt -
90, Springer Verlag, LNCS # 473, p.p. 458-464.
15. Chaum D. (1991). Group signatures, Advance in Cryptology-Eurocrypt - 91, Springer Verlag,
p.p. 257-265.
16. Chaum D. (1995). Designed confirmer signatures, Advance in Cryptology-Eurocrypt - 94
Springer Verlag, LNCS # 950, p.p. 86-91.
17. Chaum-m. Li, Hwang T., Lee N. and Jiun-Jang Tsai (2000). (t, n) threshold multi-signature
scheme and generalized multi-signature scheme, where suspected forgery implies
traceability of the adversarial shareholders, Cryptologia 24(3), p.p. 250-268.
18. Chen L. and Pederson T.P. (1994). New group signature signatures, Advance in Cryptology -
Eurocrypt - 94, Springer Verlag, p.p.171-181.
19. Damgard I.B. (1987). Collision free hash function and public key signature scheme Advance
in Cryptology - Eurocrypt - 87, Springer Verlag, p.p. 203-216.
20. Desmedt Y. (1988). Society and group oriented cryptography, Advances in Cryptology
Crypto - 87, Springer Verlag, p.p. 120 - 127.
21. Desmedt, Y. and Frankel Y. (1990). Threshold cryptosystems, Advances in Cryptology Crypto
- 89, Springer Verlag, LNCS # 293, p.p. 307-315.
22. Desmedt, Y. and Frankel Y. (1991). Shared generation of authenticators and signatures,
Advances in Cryptology Crypto - 91, Springer Verlag, p.p. 457-469.
23. Desmedt Y. (1994). Threshold cryptography, European Transactions on Telecommunications
and Related Technologies - 5(4), p.p.35 43.
24. Diffie W. and Hellman M. (1976). New directions in Cryptography, IEEE Trans. InformationTheory - 31, p.p. 644 - 654.
25. Diffie W. (1988). The first ten years of Public Key Cryptography, In Contemporary
Cryptology: The Science of Information Integrity, Editor, Simmons G.J. IEEE Press, New York.
p.p 135-175.
-
8/3/2019 Manoj DR BRAU Thesis
112/122
111
26. Dowland P. S., Furenell S. M., Illingworth H. M. and Reynolds P. L. (1999). Computer crime
and abuse: A survey of public attitudes and awareness, Computer and Security - 18(8), p.p.
715-726.
27. Due Liem V. (2003). A new threshold blind signature scheme from Pairings.
www.caislab.icu.ac.kr
28. ElGamel T. (1985). A PKC and a signature scheme based on discrete logarithm, IEEE trans
information theory - 31, p.p. 469 - 472.
29. Fiat A. and Shamir A. (1986). How to prove yourself, Practical solution to identification and
signature problem, Advances in Cryptology - Crypto - 86 Springer and Verlag, LNCS # 263,
p.p. 186-194.
30. Frankal Y. and Desmedt Y. (1992). Parallel reliable threshold multi-signature, Tech report,
Dept of EE and CS, University of Wisconsin.
31. Gennaro R., Jarecki Hkrawczyk S. and Rabin T. (1996). Robust threshold DSS signature,
Advances in CryptologyEuroCrypt - 96, Springer Verlag, p.p. 354 - 371.
32. Gnanaguruparan G. and Kak S. (2002). Recursive Hiding of the secrets in the visual
Cryptography, Cryptologia - 25 (1), p.p. 68 75.
33. Goldrich O. (1986). Two remark concerning the GMR signature scheme, Advance in
Cryptology - Crypto 86, Springer and Verlag, p.p. 104 - 110.
34. Goldwasser, Michali S. and Yao A. (1983). Strong signature scheme, Proceeding of the 15th
STOC - ACM, p.p. 431 - 439.
35. Goldwasser S., Michali S. and Rivest R. (1985). A paradoxical signature scheme, 25th IEEE
symposium of foundation on the computing, p.p. 441 344.
36. Goldwasser S., Michali S. and Rivest R. (1998). A digital signature secure against adaptive
chosen message attacks, SIAM Journal on Computing - 17, p.p. 281-308.
37. Gordon J. A. (1985). Strong primes are easy to find, Advances in Cryptology -Eurocrypt 84,
Springer-Verlag, p.p. 216-223.
38. Guillou L.C. and Quisquater J.J. (1988). A paradoxical identity based on signature scheme
resulting from zero knowledge, Advances in Cryptology Crypto 88, Springer-Verlag, p.p. 216-
231.
-
8/3/2019 Manoj DR BRAU Thesis
113/122
112
39. Guillou L.C. and Quisquater J.J. (1988). A practical zero-knowledge protocol fitted to security
microprocessors minimizing both transmission and memory, Advances in Cryptology
Eurocrypt - 88, Springer-Verlag LNCS # 330, p.p.123 - 128.
40. Hard jono T. and Zheng Y. (1992). A practical digital multi-signature scheme based on
discrete logarithm, Advance in Cryptology Auscrypto 92 Springer and Verlag, p.p.16-21.
41. Harn L. and Kiesler T. (1989). New Scheme for Digital Multi-signature, Electronic Letters - 25
(15), p.p. 1002-1003.
42. Harn L. and Yang S. (1992). Group oriented undeniable signature scheme without the
assistance of a mutually trusted party, Advance in Cryptology- Auscrypt - 92, Springer and
Verlag, p.p. 133-142.
43. Harn L. (1993). (t,n) threshold signature and digital multi-signature. Proceeding of Workshop
on Cryptography & data security, Chung Cheng Institute of technology, ROC, p.p. 61 73.
44. Harn L. (1994). Group oriented (t, n) threshold signature scheme and digital multi-signature,
IEEE, Proc computer digit tech - 141(5), p.p. 307-313.
45. Hellman M. E. (1979). The mathematics of public key cryptography, Scientific American -
241, p.p. 130-139.
46. Hill L. (1929). Cryptography in an algebraic alphabet, American Mathematical Monthly 36,
p.p.15-30.
47. Hwang M., Lin I. and Lie E.J. (2000). A secure nonrepudiable threshold signature Scheme
with Known Signers, International Journal of Informatica - 11(2), p.p.1- 8.
48. Hwang T. and Chen C.C. (2001). A new proxy multi-signature signature scheme, International
Workshop on Cryptography and Network Security, Taipei, p.p. 26 28.
49. Hwang T., Li C. and lee N. (1993). Remark on the threshold RSA signature scheme, Advance
in Cryptology - Crypto 93, Springer and Verlag, p.p. 413-419.
50. Hwang T., Li C. and lee N. (1995). (t, n) Threshold signature scheme based on discrete
logarithm, Advance in Cryptology Eurocrypt - 94, Springer and Verlag, p.p. 191-200.
51. Itakura K. and Nakamura K. (1983). A public key cryptosystem, suitable for digital multi-
signatures, NEC Research and Develop, p.p.1- 8.
-
8/3/2019 Manoj DR BRAU Thesis
114/122
113
52. Jac C.C. and Jung H.C. (2002). An identity based signature from gap Diffie Hellman groups,
www.iacr.org
53. Jackson, W. A., Martin, K. M. and O' Keefe, C. M. (1995). Efficient secret sharing scheme
without mutually trusted party, Advance in Cryptology Eurocrypt - 95, Springer and Verlag,
p.p. 183-193.
54. Kim J. and Kim K. (2001). An efficient and provably secure threshold blind signature scheme,
www.caislab.icu.ac.kr.
55. Kobolitz N. (1987). Elliptic curve cryptosystem. Mathematics of Computation - 48, p.p.203-209.
56. Lal S. and Kumar M. (2003). A directed signature scheme and its application, Proceedings,
National Conference on Information Security, New Delhi -2003, p.p. 124 132.
57. Lal S. and Kumar M. (2003). Some applications of directed signature scheme, South East Asian
Journal of Mathematics and Mathematical Science - 1(2), p.p.13-26
58. Lal S. and Awasthi A.K. (2003). A scheme for obtaining warrant message from the digital
proxy signature scheme, Report No- 2003/73. http://www.eprint.iacr.org
59. Lal S. and Awasthi A.K. (2003). Proxy blind signature scheme. Report No- 2003/72.
http://www.eprint.iacr.org
60. Lanford S. K. (1995). Differential linear cryptanalysis and threshold signatures, Advance in
Cryptology Crypto - 94, Springer and Verlag, p.p.17-25.
61. Lanford S. K. (1995). Threshold DSS signatures without a trusted party, Advance in
Cryptology - Crypto 95, Springer-Verlag, p.p. 397-400.
62. Langford, S. K. (1996). Weaknesses in some threshold cryptosystems. Advance in Cryptology
Crypto - 96, Springer and Verlag, p.p. 74- 82.
63. Lee B. and Kim H. (2001). Strong proxy signature scheme and its applications, Proceeding of
SCIS, p.p.603- 608. http://www.citeseer.nj.nec.com
64. Lehmer D.H. and Powers R.E. (1931). On factoring large numbers, American Mathematical
Society, p.p.770-776.
65. Lidl R. and Mueller, W. B. (1983). Permutation polynomials in RSA cryptosystems, Advance
in Cryptology Crypto - 83, Springer and Verlag, p.p.293-301.
-
8/3/2019 Manoj DR BRAU Thesis
115/122
114
66. Lim C.H. and Lee P.J. (1993). Modified Maurer-Yacobis scheme and its Applications,
Advance in Cryptology Auscrypt - 93, Springer and Verlag, LNCS # 718, p.p. 308 323.
67. Lim C.H. and Lee P.J. (1996). A directed signature scheme and its application to threshold
cryptosystems, Security Protocol, In Proceedings of International Workshop, (Cambridge, United
Kingdom), Springer-Verlag, LNCS #1189, p.p. 131-138.
68. Luciano D.M. and Prichett G.D. (1987). Cryptology: From Caesar cipher to public key
cryptosystem, College Mathematics Journal - 18, p.p. 2-17.
69. Mambo M. Usuda K. and Okamoto E. (1996). Proxy signature: Delegating of the power to sign
messages, In IEICE Transaction E79-A (9), p.p. 1338 1356.
70. Maurer U. (1990). Fast generation of secure of RSA- moduli with almost maximal diversity,
Advances in Cryptology Eurocrypt - 89,Springer and Verlag, LNCS # 434, p.p. 636 - 647.
71. Merkle R.C. and Hellman M.E. (1978). Hiding information and signatures in trapdoor
knapsacks, IEEE transactions on the information theory, IT 24, p.p.525- 530.
72. Merker R. C. (1987). A digital signature based on convential encryption function, Advance in
Cryptology Crypto - 87, Springer and Verlag, LNCS # 293, p.p.369-378.
73. Michali S. (1992). Fair public key cryptosystems, Advance in Cryptology Crypto - 92,
Springer and Verlag, p.p.113-138.
74. Miller V.S. (1986). Use of Elliptic Curves in Cryptography, Advances in Cryptology Crypto -
86, Springer and Verlag, p.p. 417 - 426.
75. Mu Y. Varadharajan V. (2000). Distributed signcryption, Advance in Cryptology Indocrypt -
2000, Springer and Verlag,LNCS # 1977, p.p. 155- 164.
76. Naor M. and Shamir A. (1994). Visual cryptography, Advances in Cryptology Eurocrypt
94,Springer and Verlag, p.p. 1 12.
77. NIST. (1994). Digital signature standard, U.S Department of Commerence, FIPS PUB, 186.
78. Nyberg K. and Rueppel R.A. (1994). A new signature scheme based on the DLP giving
message recovery, Advances in Cryptology Eurocrypt 94,Springer and Verlag, p.p. 182 -193.
79. Odlyzko A.M. (1984). Discrete logs in a finite field and their cryptographic significance,
Advances in Cryptology Eurocrypt - 84, Springer and Verlag, LNCS # 209, p.p. 224 - 314.
-
8/3/2019 Manoj DR BRAU Thesis
116/122
115
80. Okamoto T. (1988). A digital Multi-signature scheme using bijective PKC, ACM transactions
on computer systems 6(8), p.p. 432-441.
81. Ohta K. and Okamoto T. (1991). A digital multi-signature scheme based on Fiat- Shamir
scheme, Advance in Cryptology - Asiacrypt 91, Springer and Verlag, p.p. 75 79.
82. Okamoto T. (1992). Provably secure and practical Identification schemes and corresponding
signature scheme, Advance in Cryptology Crypto - 92, Springer and Verlag, LNCS # 740, p.p.
31-53.
83. Okamoto T. (1994). Designated confirmer and public encryption are equivalent, Advance in
Cryptology Crypto 94, Springer and Verlag, LNCS # 839, p.p. 61-74.
84. Pedersen, T. P. (1991). A threshold cryptosystem without trusted party, Advances in
Cryptology Eurocrypt - 91, Springer and Verlag, p.p. 522- 526.
85. Pederson T. P. (1991). Distributed provers with application to undeniable signatures,
Advances in Cryptology Eurocrypt - 91, Springer and Verlag, p.p. 221- 242.
86. Pointcheval D. and Stern J. (2000). Security arguments for digital signature and blind
signatures, Journal of Cryptology -13 (3), Springer-Verlag, p.p. 361-390.
87. Pomerance C. (1981). Recent development in the primality testing, The mathematical
intelligencer - 3, p.p. 97-105.
88. Pomerance C. (1982). The search for the prime numbers, Scientific American - 247, p.p. 136-
147.
89. Poupard G. and Stern J. (1998). Security analysis of practical On the Fly authentication
and signature generation, Advance in Cryptology - Eurocrypt - 98, Springer Verlag, LNCS #
1403, p.p. 422 - 436.
90. Rabin T. (1998). A simplified approach to threshold and proactive RSA, Advances in
Cryptology Crypto - 98, Springer Verlag, p.p. 89-104.
91. Rivest, R., Shamir A. and Aldeman L. (1978). A method of obtaining digital signatures and
PKCS, Communication of ACM - 21(2), p.p. 120-126.
92. Rubin F. (1995). Message authentication using Quadric Residues, Cryptologia - 19(4), p.p.
397- 207.
-
8/3/2019 Manoj DR BRAU Thesis
117/122
116
93. Ruland.C. (1993). Realizing digital signature with one-way Hash function, Cryptologia
17(3), p.p. 285-300.
94. Schnorr C.P. (1990). Efficient identification and signature for smart cards, Advance in
Cryptology Crypto - 89, Springer-Verlag, LNCS # 435, p.p. 239-251.
95. Schnorr C.P. (1991). Efficient signature generation by Smart cards, Journal of Cryptology -
4(3), p.p. 161-174.
96. Schnorr C. P. and Jakobsson M. (2000). Security of signed ElGamal encryption, Advance in
Cryptology - AsiaCrypt - 2000, Springer-Verlag, LNCS # 1976, p.p. 73-89.
97. Shamir A. (1979). How to share a secret, Communications of the association for computing
machinery 22, p.p. 612 - 613.
98. Shamir A. (1982). A polynomial time algorithm for breaking the basic Merkle Hellman
Cryptosystem, Proceeding of th