Advertisement

A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid

  • Yunfa Li
  • Hai Jin
  • Deqing Zou
  • Jieyun Chen
  • Zongfen Han
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

Group communication is one of the most important strategies to realize large-scale information resource sharing in grid. However, it is very difficult to ensure the security of group communication in grid. In this paper, we propose a digital signature mechanism with one time secret key. In the mechanism, the trust center only needs to issue the partial secret key one time for each group member; and each group member can generate its different secret key each time. Moreover, the size of the signature is independent of the number of group members and the group public key is constant. According to this mechanism, we present a new authentication scheme. In order to verify the efficiency of the scheme, a series of simulation experiments are presented. The results show that the scheme is efficient for group communication in grid.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Demchenko, Y.: Virtual organizations in computer grids and identity management. Information Security Technical Report 9(1), 59–76 (2004)CrossRefGoogle Scholar
  2. 2.
    Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  3. 3.
    Lee, W., Chang, C.: Efficient Group Signature Scheme Based on the Discrete Logarithm. IEE Proceedings Computers & Digital Techniques 145(1), 15–18 (1998)CrossRefGoogle Scholar
  4. 4.
    Tseng, Y M., Jan, J K.: Improved Group Signature Based on Discrete Logarithm Problem. Electronics Letters 35(1), 37–38 (1999)CrossRefGoogle Scholar
  5. 5.
    Sun, H.: Comment: Improved Group Signature Scheme Based on Discrete Logarithm Problem. Electronics Letters 35(16), 1323–1324 (1999)CrossRefGoogle Scholar
  6. 6.
    Tseng, Y M., Jan, J K.: A Novel ID-based Group Signature. In: Proceedings of Workshop on Cryptology and Information Security at 1998 International Computer Symposium, Tainan, pp. 159–164 (1998)Google Scholar
  7. 7.
    Popescu, C.: A Modification of the Tseng-Jan Group Signature Scheme. Studia Universitatis Babes-Bolyai Informatica XLV(2), 36–40 (2000)Google Scholar
  8. 8.
    Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 120–133. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Chang, Y S., Wu, T C.: Group-oriented authentication mechanism with key exchange. Computer Communication 21(5), 485–497 (1998)CrossRefGoogle Scholar
  10. 10.
    Safavi-Naini, R., Wang, H.X.: Broadcast authentication for group communication. Theoretical Computer Science 269(1-2), 1–21 (2001)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Yunfa Li
    • 1
  • Hai Jin
    • 1
  • Deqing Zou
    • 1
  • Jieyun Chen
    • 1
  • Zongfen Han
    • 1
  1. 1.Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074China

Personalised recommendations