Please use this identifier to cite or link to this item:
Title: Performance and Security of Group Signature in Wireless Networks
Authors: Tom, Joshua J.
Alese, Boniface K.
Thompson, Aderonke F.
Anebo, Nlerum P.
Keywords: Wireless network
Group signature
Issue Date: 2018
Publisher: International Journal of Computer (IJC)
Citation: Joshua J. Toma , Prof Boniface. K. Aleseb , Dr. Aderonke F. Thompsonc , Dr. Nlerum P. Anebod (2018). Performance and Security of Group Signature in Wireless Networks. International Journal of Computer (IJC)
Abstract: A Group signature protocol is a cryptographic scheme that decouples a user identity and location from verification procedure during authentication. In a group signature scheme, a user is allowed to generate signatures on behalf of other group members but identity and location information of the signer is not known by a verifier. This ensures privacy, authentication and unlinkability of users. Although group signature is expensive to implement, its existential anonymity, non-repudiation and untraceablility properties make it attractive especially for resources-constrained devices in wireless network. A general group signature scheme usually contains six basic phases: setup (or key generation), join, message signing (or signature generation), signature verification, open and user revocation. In this paper, an evaluation of the performance of group signature based on three of the phases mentioned above is considered and its security in wireless networks examined. The key generation, signing and verification algorithms are implemented in Java 8. A proof of security of group signature by implication is also presented.
ISSN: 2307-4523
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
Performance and Security of Group Signature in.pdfArticle full-text387.17 kBAdobe PDFView/Open

Items in EUSpace are protected by copyright, with all rights reserved, unless otherwise indicated.