DOI QR코드

DOI QR Code

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce

유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명

  • 성순화 (충남대학교 차세대통신인력양성사업단)
  • Published : 2007.06.30

Abstract

Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

유비쿼터스 전자거래를 통하여 사용자는 언제 어디서나 네트워크에 접근하여 편리한 정보를 개인과 그룹, 그룹과 그룹 사이에서 교환할 수 있다. 사용자가 이러한 유비쿼터스 전자거래를 안전하게 사용하기 위해서는, 전자 정보의 무결성과 인증의 특성을 가지는 디지털 서명이 필수 조건이다. 유비쿼터스 네트워크에서의 디지털 서명은 언제 어디서나 필요에 따라 그룹을 만들기도 하고 해체하기도 하므로, 유비쿼터스 전자거래는 신뢰된 그룹 관리자와 셋업 프로시져 철회 프로시져 등이 필요 없는 디지털 서명이 요구된다. 따라서 본 논문에서는 안전한 유비쿼터스 전자거래를 위한 디지털 서명으로서 쓰레시홀드 링 서명을 제안한다. 제안된 디지털 서명은 위조의 위험이 없는(무결성) 링 서명과 메시지가 다른 서명자에 의해 서명되는 것을 증명할 수 없는 문제를 해결하는(인증) (n,t)링 서명을 사용한다. 그러므로 제안된 쓰레시홀드 링 서명은 무결성과 인증을 만족하는 차세대 유비쿼터스 그룹 서명이다.

Keywords

References

  1. R.L.Livest, A. Shamir and L. M. Adleman, 'A method for obtaining digital signatures and public key cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978 https://doi.org/10.1145/359340.359342
  2. National Institute of Standards and Technology(NIST), 'The digital signature standard, proposal and discussion,' Communications of the ACM, Vol.35, No.7, pp.36-34, 1992 https://doi.org/10.1145/129902.129904
  3. L. Harn, 'Group oriented(t,n) threshold digital signature scheme and digital multisignature,' in IEE Proceedings of Computer and Digital Techniques, Vol.141, No.5, pp.307-313, 1994 https://doi.org/10.1049/ip-cdt:19941293
  4. Y. Desmedt and Y. Frankel, 'Shared generation of authentication and signatures,' Advances in Cryptology-CRYPTO'91, pp.457-469, 1991
  5. C. Li, T. Hwang and N. Lee, 'Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders,' Advances in Cryptology Proceedings of EUROCRYPT'94, pp.413-419, 1994
  6. T. Hardjono and Y. Zheng, 'A practical digital multisignature scheme based on discrete logarithm,' Advances in Cryptology-Proceedings of Asiacrypto'92, pp.16-21, 1993
  7. L. Ham and T. Kiesler, 'New scheme for digital multisignatures,' Electronics Letters, Vol.25, No.15, pp.1002-1003, 1989 https://doi.org/10.1049/el:19890670
  8. C. Li, T. Hwang and N. Lee, 'Remark on the threshold RSA signature scheme,' Advances in Cryptology-CRYPTO'93, Lecture Notes in Computer Science, Vol.773, pp.413-420, 1994 https://doi.org/10.1007/3-540-48329-2_35
  9. A. Shamir, 'How to share a secret,' Communications of the ACM, Vol.22, No.11, pp.612-613, 1979 https://doi.org/10.1145/359168.359176
  10. Wei-Bin Lee and Chin-Chen Chang, '(t,n) Threshold Digital Signature with Traceability Property,' Journal of Information Science and Engineering 15, pp.669-678, 1999
  11. R. Rivest, A. Shamir, and Y. Tauman, 'How to leak a secret,' In Asiacypt'01, LNCS 2248, pp.552-565
  12. E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad hoc groups,' http://www.di.ens.fr/~bresson/
  13. E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad-hoc groups,' Advances of Cryptology-¬CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.465-480, 2002
  14. M. Noar, 'Deniable ring authentication,' Advances of Cryptology-CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.481-498, 2002
  15. M. Abe, M. Ohkubo, and K. Suzuki, '1-out of-n signatures from a variety of keys,' Advances of Cryptology-ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, Springer-Verlag, pp.415-432, 2002
  16. J. Herranz and G. Saez, 'Forking lemmas in the ring signatures' scenario,' Cryptology ePrint Archive, April 2003