SlideShare a Scribd company logo
1 of 16
Download to read offline
Presented by: Ravina jeswani Sophia Girls college(Autonomous) Ajmer.
M.Sc.(CS) Sem IV www.sophiacollegeajmer.in
Group signature scheme resistant
against
colluding attack
Presentation On
CONTENTS
•What is group signature ?
•Application of group signature
•Cryptography Concepts and Signature Requirements
•Classification of group signature schemes
•Phases of group signature scheme
•Collusion
•Group signature scheme resistant against colluding attack
•Implementation
•Conclusion
what is group signature ?
A digital signature is a mathematical scheme for providing the authenticity of a
digital information or document.
“A group signature scheme is a technique of signing the documents or any relevant
information anonymously on behalf of group, where group consist of manager and
various designated members”.
According to the Chaum and Heyst, the group signature must include following policies -
• Group members are only role person to sign the messages.
• The integrity of the signature should be checked without revealing the identity of the
signer.
• If necessary, the signature can be opened to reveal the identity of signer.
Cryptography Concepts and
Signature Requirements
Cryptography can be defined as protecting information by transforming into an unreadable
format, called cipher text. Only those who possess a secret key can decipher the message
into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called
code breaking, although modern cryptography techniques are virtually unbreakable.
Cryptography systems can be broadly classified into-
• symmetric-key systems
• Asymmetric-key systems
Applications of group signature
• Voting System : E-voting also known as electronic voting collectively means to cast
vote and count the votes electronically. E-voting is physically supervised by
representatives of governmental or independent electoral authorities where group
signature would be beneficial.
• Sales and Bidding System : E-commerce, is a type of industry where buying and selling
of product or service is conducted over electronic systems such as the Internet and other
computer networks. Group signature is effective and efficient way of providing security
in communicating within an organization.
• Corporate Organisation : Group signature proves to be efficient way to authorize the
information among everyone and saving the valuable time with a reliable approach.
Classification of group signature
• Static Group Signature : The static group signature determines all the parameters
initially with the group member in the group and also revocation is possible only
through removing of member but no addition of member allowed.
• Dynamic Group Signature : Random and non-deterministic nature of scheme.
• Group Signature with Verifiable Opening
• Group Signature with Distributed Roles
• System setup: includes key generation
mechanism.
• Join: includes joining of members in the group.
• Sign: performs the signature generation.
• Verify: verification of signature via group's
public key
• Open: the identity of signer can be revealed by
the group manager, if necessary.
Phases of group signature scheme
COllusion
Collusion as the name suggest is a act of cooperation between two person or set
of person for the sake of achieving mainly the illegal benefits.
Collusion is a very common and risky problem to be faced in every field which cannot be
controlled easily as the unpredictable nature of attack.
Scenario of collusion attack shown -
Group signature scheme resistant
against colluding attack
A trusted third party (TTP) is an entity involved in the proposed scheme who manages all
critical communications among the group members and group manager.
Proposed Scheme :
The proposed group signature scheme consists of four participants namely, group
manager, group members, designated verifier, and trusted third party. The scheme
consisting of following five phases -
• Setup phase-
• Join phase- QA. The trusted third party has database maintained for the member
according to the slot and structure defined.
• Signature generation phase- Key encrypted via manager's public key are finally
encrypted using group key and send to the verifier.
• Verification phase- The verifier gets the encrypted data which he decrypts using
the group key and verifier's private key accordingly.
• Open phase- The encrypted signature can be decrypted by manager with the
group key and can check the hash value that is encrypted with the manager's key.
As manager has the key hashed with respect to each member so can say who has
generated the signature.
implementation
The implementation of proposed scheme is done using Java platform and Mysql as
database for storing the key parameters.
The implementation consists of following steps in proposed scheme:
• Setup phase
• Join phase
• Signature generation phase
• Verify phase
• Setup phase-
• Join phase-
• Signature generation and Verification phase-
• The proposed scheme satisfies standard security features like anonymity, unforgeability,
and unlinkability.
• The proposed scheme is member independent such that any member leaving or
joining would not affect the signature generation scheme.
• The size of signature is still needed to be considered.
• The signers can be employees of the organization and the verifier may be a specific
customer.
• This scheme can also be applicable in e-voting system, e-cash system and e-commerce
applications.
Conclusion
Thank you

More Related Content

What's hot

OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
IBM Blockchain Platform Technical Introduction v1.1
IBM Blockchain Platform Technical Introduction v1.1IBM Blockchain Platform Technical Introduction v1.1
IBM Blockchain Platform Technical Introduction v1.1Matt Lucas
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsTorsten Lodderstedt
 
E-voting system with blockchain
E-voting system with blockchainE-voting system with blockchain
E-voting system with blockchainyashgupta9121
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Jongseung Kim
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)Torsten Lodderstedt
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)Amit Dahal
 
Hyperledger Fabric Architecture
Hyperledger Fabric ArchitectureHyperledger Fabric Architecture
Hyperledger Fabric Architecture상문 오
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 

What's hot (20)

OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
IBM Blockchain Platform Technical Introduction v1.1
IBM Blockchain Platform Technical Introduction v1.1IBM Blockchain Platform Technical Introduction v1.1
IBM Blockchain Platform Technical Introduction v1.1
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential Objects
 
E-voting system with blockchain
E-voting system with blockchainE-voting system with blockchain
E-voting system with blockchain
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)
 
Hyperledger Fabric Architecture
Hyperledger Fabric ArchitectureHyperledger Fabric Architecture
Hyperledger Fabric Architecture
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Kerberos
KerberosKerberos
Kerberos
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 

Similar to Group signature

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authenticationmbadhi
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2robin_bene
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
Blockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptxBlockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptxssuser561dc11
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection MechanismMona Rajput
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android projectMuthukumaranM13
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharingCrystalRose25
 

Similar to Group signature (20)

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Enhanced privacy ID
Enhanced privacy IDEnhanced privacy ID
Enhanced privacy ID
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Unit 5
Unit 5Unit 5
Unit 5
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Blockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptxBlockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptx
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharing
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 

More from Sophia Girls' College(Autonomous), Ajmer (11)

Software testing strategies
Software testing strategiesSoftware testing strategies
Software testing strategies
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Quiz on XML
Quiz on XMLQuiz on XML
Quiz on XML
 
Quiz on Relational Algebra
Quiz on Relational AlgebraQuiz on Relational Algebra
Quiz on Relational Algebra
 
Dbms quiz
Dbms quiz Dbms quiz
Dbms quiz
 
Software Engineering Quiz
Software Engineering QuizSoftware Engineering Quiz
Software Engineering Quiz
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Managment spectrum
Managment spectrumManagment spectrum
Managment spectrum
 
Software Process
Software ProcessSoftware Process
Software Process
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Data Mining
Data Mining Data Mining
Data Mining
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Group signature

  • 1. Presented by: Ravina jeswani Sophia Girls college(Autonomous) Ajmer. M.Sc.(CS) Sem IV www.sophiacollegeajmer.in Group signature scheme resistant against colluding attack Presentation On
  • 2. CONTENTS •What is group signature ? •Application of group signature •Cryptography Concepts and Signature Requirements •Classification of group signature schemes •Phases of group signature scheme •Collusion •Group signature scheme resistant against colluding attack •Implementation •Conclusion
  • 3. what is group signature ? A digital signature is a mathematical scheme for providing the authenticity of a digital information or document. “A group signature scheme is a technique of signing the documents or any relevant information anonymously on behalf of group, where group consist of manager and various designated members”. According to the Chaum and Heyst, the group signature must include following policies - • Group members are only role person to sign the messages. • The integrity of the signature should be checked without revealing the identity of the signer. • If necessary, the signature can be opened to reveal the identity of signer.
  • 4. Cryptography Concepts and Signature Requirements Cryptography can be defined as protecting information by transforming into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called code breaking, although modern cryptography techniques are virtually unbreakable. Cryptography systems can be broadly classified into- • symmetric-key systems • Asymmetric-key systems
  • 5. Applications of group signature • Voting System : E-voting also known as electronic voting collectively means to cast vote and count the votes electronically. E-voting is physically supervised by representatives of governmental or independent electoral authorities where group signature would be beneficial. • Sales and Bidding System : E-commerce, is a type of industry where buying and selling of product or service is conducted over electronic systems such as the Internet and other computer networks. Group signature is effective and efficient way of providing security in communicating within an organization. • Corporate Organisation : Group signature proves to be efficient way to authorize the information among everyone and saving the valuable time with a reliable approach.
  • 6. Classification of group signature • Static Group Signature : The static group signature determines all the parameters initially with the group member in the group and also revocation is possible only through removing of member but no addition of member allowed. • Dynamic Group Signature : Random and non-deterministic nature of scheme. • Group Signature with Verifiable Opening • Group Signature with Distributed Roles
  • 7. • System setup: includes key generation mechanism. • Join: includes joining of members in the group. • Sign: performs the signature generation. • Verify: verification of signature via group's public key • Open: the identity of signer can be revealed by the group manager, if necessary. Phases of group signature scheme
  • 8. COllusion Collusion as the name suggest is a act of cooperation between two person or set of person for the sake of achieving mainly the illegal benefits. Collusion is a very common and risky problem to be faced in every field which cannot be controlled easily as the unpredictable nature of attack. Scenario of collusion attack shown -
  • 9. Group signature scheme resistant against colluding attack A trusted third party (TTP) is an entity involved in the proposed scheme who manages all critical communications among the group members and group manager. Proposed Scheme : The proposed group signature scheme consists of four participants namely, group manager, group members, designated verifier, and trusted third party. The scheme consisting of following five phases -
  • 10. • Setup phase- • Join phase- QA. The trusted third party has database maintained for the member according to the slot and structure defined.
  • 11. • Signature generation phase- Key encrypted via manager's public key are finally encrypted using group key and send to the verifier. • Verification phase- The verifier gets the encrypted data which he decrypts using the group key and verifier's private key accordingly. • Open phase- The encrypted signature can be decrypted by manager with the group key and can check the hash value that is encrypted with the manager's key. As manager has the key hashed with respect to each member so can say who has generated the signature.
  • 12. implementation The implementation of proposed scheme is done using Java platform and Mysql as database for storing the key parameters. The implementation consists of following steps in proposed scheme: • Setup phase • Join phase • Signature generation phase • Verify phase
  • 13. • Setup phase- • Join phase-
  • 14. • Signature generation and Verification phase-
  • 15. • The proposed scheme satisfies standard security features like anonymity, unforgeability, and unlinkability. • The proposed scheme is member independent such that any member leaving or joining would not affect the signature generation scheme. • The size of signature is still needed to be considered. • The signers can be employees of the organization and the verifier may be a specific customer. • This scheme can also be applicable in e-voting system, e-cash system and e-commerce applications. Conclusion