SlideShare a Scribd company logo
Presented by: Ravina jeswani Sophia Girls college(Autonomous) Ajmer.
M.Sc.(CS) Sem IV www.sophiacollegeajmer.in
Group signature scheme resistant
against
colluding attack
Presentation On
CONTENTS
•What is group signature ?
•Application of group signature
•Cryptography Concepts and Signature Requirements
•Classification of group signature schemes
•Phases of group signature scheme
•Collusion
•Group signature scheme resistant against colluding attack
•Implementation
•Conclusion
what is group signature ?
A digital signature is a mathematical scheme for providing the authenticity of a
digital information or document.
“A group signature scheme is a technique of signing the documents or any relevant
information anonymously on behalf of group, where group consist of manager and
various designated members”.
According to the Chaum and Heyst, the group signature must include following policies -
• Group members are only role person to sign the messages.
• The integrity of the signature should be checked without revealing the identity of the
signer.
• If necessary, the signature can be opened to reveal the identity of signer.
Cryptography Concepts and
Signature Requirements
Cryptography can be defined as protecting information by transforming into an unreadable
format, called cipher text. Only those who possess a secret key can decipher the message
into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called
code breaking, although modern cryptography techniques are virtually unbreakable.
Cryptography systems can be broadly classified into-
• symmetric-key systems
• Asymmetric-key systems
Applications of group signature
• Voting System : E-voting also known as electronic voting collectively means to cast
vote and count the votes electronically. E-voting is physically supervised by
representatives of governmental or independent electoral authorities where group
signature would be beneficial.
• Sales and Bidding System : E-commerce, is a type of industry where buying and selling
of product or service is conducted over electronic systems such as the Internet and other
computer networks. Group signature is effective and efficient way of providing security
in communicating within an organization.
• Corporate Organisation : Group signature proves to be efficient way to authorize the
information among everyone and saving the valuable time with a reliable approach.
Classification of group signature
• Static Group Signature : The static group signature determines all the parameters
initially with the group member in the group and also revocation is possible only
through removing of member but no addition of member allowed.
• Dynamic Group Signature : Random and non-deterministic nature of scheme.
• Group Signature with Verifiable Opening
• Group Signature with Distributed Roles
• System setup: includes key generation
mechanism.
• Join: includes joining of members in the group.
• Sign: performs the signature generation.
• Verify: verification of signature via group's
public key
• Open: the identity of signer can be revealed by
the group manager, if necessary.
Phases of group signature scheme
COllusion
Collusion as the name suggest is a act of cooperation between two person or set
of person for the sake of achieving mainly the illegal benefits.
Collusion is a very common and risky problem to be faced in every field which cannot be
controlled easily as the unpredictable nature of attack.
Scenario of collusion attack shown -
Group signature scheme resistant
against colluding attack
A trusted third party (TTP) is an entity involved in the proposed scheme who manages all
critical communications among the group members and group manager.
Proposed Scheme :
The proposed group signature scheme consists of four participants namely, group
manager, group members, designated verifier, and trusted third party. The scheme
consisting of following five phases -
• Setup phase-
• Join phase- QA. The trusted third party has database maintained for the member
according to the slot and structure defined.
• Signature generation phase- Key encrypted via manager's public key are finally
encrypted using group key and send to the verifier.
• Verification phase- The verifier gets the encrypted data which he decrypts using
the group key and verifier's private key accordingly.
• Open phase- The encrypted signature can be decrypted by manager with the
group key and can check the hash value that is encrypted with the manager's key.
As manager has the key hashed with respect to each member so can say who has
generated the signature.
implementation
The implementation of proposed scheme is done using Java platform and Mysql as
database for storing the key parameters.
The implementation consists of following steps in proposed scheme:
• Setup phase
• Join phase
• Signature generation phase
• Verify phase
• Setup phase-
• Join phase-
• Signature generation and Verification phase-
• The proposed scheme satisfies standard security features like anonymity, unforgeability,
and unlinkability.
• The proposed scheme is member independent such that any member leaving or
joining would not affect the signature generation scheme.
• The size of signature is still needed to be considered.
• The signers can be employees of the organization and the verifier may be a specific
customer.
• This scheme can also be applicable in e-voting system, e-cash system and e-commerce
applications.
Conclusion
Thank you

More Related Content

What's hot

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
Aditya Nama
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
 
Communication Security
Communication SecurityCommunication Security
Communication Security
Axis Communications
 
CCIE Certificate
CCIE CertificateCCIE Certificate
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
Cahyo Darujati
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Group signature
Group signatureGroup signature
Group signature
Nurul Amin Choudhury
 
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014Nov Matake
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Skybox security
Skybox security Skybox security
Skybox security
Alejandro Cadarso
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
Jack Forbes
 
Overview of the ARC Protocol for Email
Overview of the ARC Protocol for EmailOverview of the ARC Protocol for Email
Overview of the ARC Protocol for Email
Steve Jones
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 

What's hot (20)

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
CCIE Certificate
CCIE CertificateCCIE Certificate
CCIE Certificate
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Group signature
Group signatureGroup signature
Group signature
 
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Spoofing
SpoofingSpoofing
Spoofing
 
Skybox security
Skybox security Skybox security
Skybox security
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 
Overview of the ARC Protocol for Email
Overview of the ARC Protocol for EmailOverview of the ARC Protocol for Email
Overview of the ARC Protocol for Email
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 

Similar to Group signature

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Enhanced privacy ID
Enhanced privacy IDEnhanced privacy ID
Enhanced privacy ID
zeeshanafaque1
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
Ben Abdallah Helmi
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
Ben Abdallah Helmi
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
Damian T. Gordon
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
dotco
 
Unit 5
Unit 5Unit 5
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
mbadhi
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
robin_bene
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
PT Datacomm Diangraha
 
Blockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptxBlockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptx
ssuser561dc11
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
Mona Rajput
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
MuthukumaranM13
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharing
CrystalRose25
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
RoyBokhiriya
 

Similar to Group signature (20)

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Enhanced privacy ID
Enhanced privacy IDEnhanced privacy ID
Enhanced privacy ID
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Unit 5
Unit 5Unit 5
Unit 5
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Blockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptxBlockchain-Based Voting System.pptx
Blockchain-Based Voting System.pptx
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharing
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 

More from Sophia Girls' College(Autonomous), Ajmer

Software testing strategies
Software testing strategiesSoftware testing strategies
Software testing strategies
Sophia Girls' College(Autonomous), Ajmer
 
Software Testing
Software TestingSoftware Testing
Quiz on XML
Quiz on XMLQuiz on XML
Quiz on Relational Algebra
Quiz on Relational AlgebraQuiz on Relational Algebra
Quiz on Relational Algebra
Sophia Girls' College(Autonomous), Ajmer
 
Dbms quiz
Dbms quiz Dbms quiz
Software Engineering Quiz
Software Engineering QuizSoftware Engineering Quiz
Software Engineering Quiz
Sophia Girls' College(Autonomous), Ajmer
 
Software metrics
Software metricsSoftware metrics
Managment spectrum
Managment spectrumManagment spectrum
Software Process
Software ProcessSoftware Process
Artificial intelligence
Artificial intelligenceArtificial intelligence
Data Mining
Data Mining Data Mining

More from Sophia Girls' College(Autonomous), Ajmer (11)

Software testing strategies
Software testing strategiesSoftware testing strategies
Software testing strategies
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Quiz on XML
Quiz on XMLQuiz on XML
Quiz on XML
 
Quiz on Relational Algebra
Quiz on Relational AlgebraQuiz on Relational Algebra
Quiz on Relational Algebra
 
Dbms quiz
Dbms quiz Dbms quiz
Dbms quiz
 
Software Engineering Quiz
Software Engineering QuizSoftware Engineering Quiz
Software Engineering Quiz
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Managment spectrum
Managment spectrumManagment spectrum
Managment spectrum
 
Software Process
Software ProcessSoftware Process
Software Process
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Data Mining
Data Mining Data Mining
Data Mining
 

Recently uploaded

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 

Recently uploaded (20)

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 

Group signature

  • 1. Presented by: Ravina jeswani Sophia Girls college(Autonomous) Ajmer. M.Sc.(CS) Sem IV www.sophiacollegeajmer.in Group signature scheme resistant against colluding attack Presentation On
  • 2. CONTENTS •What is group signature ? •Application of group signature •Cryptography Concepts and Signature Requirements •Classification of group signature schemes •Phases of group signature scheme •Collusion •Group signature scheme resistant against colluding attack •Implementation •Conclusion
  • 3. what is group signature ? A digital signature is a mathematical scheme for providing the authenticity of a digital information or document. “A group signature scheme is a technique of signing the documents or any relevant information anonymously on behalf of group, where group consist of manager and various designated members”. According to the Chaum and Heyst, the group signature must include following policies - • Group members are only role person to sign the messages. • The integrity of the signature should be checked without revealing the identity of the signer. • If necessary, the signature can be opened to reveal the identity of signer.
  • 4. Cryptography Concepts and Signature Requirements Cryptography can be defined as protecting information by transforming into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called code breaking, although modern cryptography techniques are virtually unbreakable. Cryptography systems can be broadly classified into- • symmetric-key systems • Asymmetric-key systems
  • 5. Applications of group signature • Voting System : E-voting also known as electronic voting collectively means to cast vote and count the votes electronically. E-voting is physically supervised by representatives of governmental or independent electoral authorities where group signature would be beneficial. • Sales and Bidding System : E-commerce, is a type of industry where buying and selling of product or service is conducted over electronic systems such as the Internet and other computer networks. Group signature is effective and efficient way of providing security in communicating within an organization. • Corporate Organisation : Group signature proves to be efficient way to authorize the information among everyone and saving the valuable time with a reliable approach.
  • 6. Classification of group signature • Static Group Signature : The static group signature determines all the parameters initially with the group member in the group and also revocation is possible only through removing of member but no addition of member allowed. • Dynamic Group Signature : Random and non-deterministic nature of scheme. • Group Signature with Verifiable Opening • Group Signature with Distributed Roles
  • 7. • System setup: includes key generation mechanism. • Join: includes joining of members in the group. • Sign: performs the signature generation. • Verify: verification of signature via group's public key • Open: the identity of signer can be revealed by the group manager, if necessary. Phases of group signature scheme
  • 8. COllusion Collusion as the name suggest is a act of cooperation between two person or set of person for the sake of achieving mainly the illegal benefits. Collusion is a very common and risky problem to be faced in every field which cannot be controlled easily as the unpredictable nature of attack. Scenario of collusion attack shown -
  • 9. Group signature scheme resistant against colluding attack A trusted third party (TTP) is an entity involved in the proposed scheme who manages all critical communications among the group members and group manager. Proposed Scheme : The proposed group signature scheme consists of four participants namely, group manager, group members, designated verifier, and trusted third party. The scheme consisting of following five phases -
  • 10. • Setup phase- • Join phase- QA. The trusted third party has database maintained for the member according to the slot and structure defined.
  • 11. • Signature generation phase- Key encrypted via manager's public key are finally encrypted using group key and send to the verifier. • Verification phase- The verifier gets the encrypted data which he decrypts using the group key and verifier's private key accordingly. • Open phase- The encrypted signature can be decrypted by manager with the group key and can check the hash value that is encrypted with the manager's key. As manager has the key hashed with respect to each member so can say who has generated the signature.
  • 12. implementation The implementation of proposed scheme is done using Java platform and Mysql as database for storing the key parameters. The implementation consists of following steps in proposed scheme: • Setup phase • Join phase • Signature generation phase • Verify phase
  • 13. • Setup phase- • Join phase-
  • 14. • Signature generation and Verification phase-
  • 15. • The proposed scheme satisfies standard security features like anonymity, unforgeability, and unlinkability. • The proposed scheme is member independent such that any member leaving or joining would not affect the signature generation scheme. • The size of signature is still needed to be considered. • The signers can be employees of the organization and the verifier may be a specific customer. • This scheme can also be applicable in e-voting system, e-cash system and e-commerce applications. Conclusion