access icon free Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management

In a group-based trust management scheme, peers are partitioned into groups based on chosen characteristics, such as location and interest. The super peer (SP), who is responsible for the storage and distribution of reputation value, has an important role in group-based trust management. Thus, if the SP is a disguised or malicious peer, serious security problems could occur. To solve these security problems, the authors propose a traceable, group-oriented, signature scheme with multiple signing policies for trust management. The SP's signature is generated by a designated group called the signature group. In the authors scheme, peers in the signature group will decide whether to generate the signature for the SP based on the SP's reputation, meaning that attackers cannot forge a valid signature. In addition, an outsider also can trace the signers who were involved in generating the signature for reputation valuation.

Inspec keywords: peer-to-peer computing; trusted computing; computer network security; digital signatures

Other keywords: signature group; reputation value distribution; multiple signing policies; SP signature; group-based trust management scheme; disguised peer; reputation value storage; security problems; malicious peer; traceable group-oriented signature scheme; super peer

Subjects: Data security; Cryptography; Cryptography theory

References

    1. 1)
      • 25. Carlo, B., Alfredo, D.S., Giovanni, D.C., Antonio, G.G., Ugo, V.: ‘Multi-secret sharing schemes’. Adv. Cryptology – CRYPTO'94, 1994(LNCS, 839), pp. 150163.
    2. 2)
      • 14. Tseng, Y.M., Jan, J.K.: ‘Attacks on threshold signature schemes with traceable signers’, Inf. Proc. Lett., 1991, 71, pp. 14 (doi: 10.1016/S0020-0190(99)00078-2).
    3. 3)
      • 8. Tian, H.R., Zou, S.H., Wang, W.D., Cheng, S.D.: ‘A hierarchical reputation model for P2P networks’, J. Electron. Inf. Technol., 2007, 29, (11), pp. 25602563.
    4. 4)
      • 11. Desmedt, Y., Frankel, Y.: ‘Shared generation of authenticators and signatures’. Advances in Cryptology – Crypto'91 Proc., 1991, pp. 458469.
    5. 5)
      • 21. Agnew, G.B., Mullin, R.C., Vanston, S.A.: ‘Improved digital signature scheme based on discrete exponentiation’, Electron. Lett., 1990, 26, (14), pp. 10241025 (doi: 10.1049/el:19900663).
    6. 6)
      • 17. Lee, N.Y.: ‘Threshold signature scheme with multiple signing policies’, IEE Proc., Comput. Digit. Tech., 2001, 148, (2), pp. 9599.
    7. 7)
      • 2. Josang, A., Ismail, R., Boyd, C.: ‘A survey of trust and reputation systems for online service provision’, Decis. Support Syst., 2007, 43, (2), pp. 618644 (doi: 10.1016/j.dss.2005.05.019).
    8. 8)
      • 16. Li, Z.C., Zhang, J.M., Luo, J., Song, W., Dai, Y.Q.: ‘Group-oriented (t, n) threshold digital signature schemes with traceable signers’. ISEC 2001, 2001(LNCS, 2040), pp. 5769.
    9. 9)
      • 23. Harn, L., Xu, Y.: ‘Design of generalized ElGamal type digital signature schemes based on discrete logarithm’, Electron. Lett., 1994, 24, (31), pp. 20252026 (doi: 10.1049/el:19941398).
    10. 10)
      • 12. Harn, L.: ‘Group-oriented (t, n) threshold signature and digital multi-signature’, IEE Proc. Comput. Digit. Tech., 1994, vol. 141, no5, pp. 307313.
    11. 11)
      • 5. Ji, M., Mehmet, A.O.: ‘Trust management and trust theory revision’, IEEE Trans. Syst. Man Cybern., 2006, Part A, 36, (3), pp. 451460 (doi: 10.1109/TSMCA.2006.871628).
    12. 12)
      • 1. Josang, A., Ismail, R.: ‘The beta reputation system’. Proc. 15th Bled Conf. on Electronic Commerce, June 2002.
    13. 13)
      • 19. Li, C., Hwang, T., Lee, N.: ‘Threshold multi-signature schemes where suspected forgery implies traceability of adversarial shareholders’. Advances in Cryptology – Proc. EUROCRYPT 94, 1994, pp. 413419.
    14. 14)
      • 15. Li, Z.C., Hui, L.C.K., Chow, K.P., Chong, C.F., Tsang, W.W., Chan, H.W.: ‘Security of Wang et al.’s group-oriented (t, n) threshold signature schemes with traceable signers’, Inf. Proc. Lett., 2001, 80, pp. 295298 (doi: 10.1016/S0020-0190(01)00179-X).
    15. 15)
      • 22. ElGamal, Y.: ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE Trans., 1985, IT-31, pp. 469472.
    16. 16)
      • 13. Wang, C.T., Lin, C.H., Chang, C.C.: ‘Threshold signature schemes with traceable signers in group communications’, Comput. Commun., 1998, 21, (8), pp. 771776 (doi: 10.1016/S0140-3664(98)00142-X).
    17. 17)
      • 7. Li, X., Ling, L.: ‘PeerTrust: supporting reputation-based trust in peer-to-peer electronic communities’, IEEE Trans. Data Knowl. Eng., 2004, 16, (7), pp. 843857 (doi: 10.1109/TKDE.2004.1318566).
    18. 18)
      • 3. Ries, S.: ‘Trust in ubiquitous computing’. PhD thesis, Technische University Darmstadt, 2009.
    19. 19)
      • 6. Trung, D.H., Nicholas, R.J., Nigel, R.S.: ‘An integrated trust and reputation model for open multi-agent systems’, Auton. Agents Multi-Agent Syst., 2006, 13, (2), pp. 119154 (doi: 10.1007/s10458-005-6825-4).
    20. 20)
      • 24. Karchmer, M., Wigderson, A.: ‘On span programs’. Proc. Eighth Annual Conf. on Structure in Complexity, San Diego, CA, May 1993, pp. 102111.
    21. 21)
      • 4. Blaze, M., Feigenbaum, J., Lacy, J.: ‘Decentralized trust management’. Proc. 17th Symp. on Security and Privacy, Oakland, CA, USA, 1996, pp. 164173.
    22. 22)
      • 20. Hsu, C.F., Cheng, Q., Tang, X., Zeng, B.: ‘An ideal multi-secret sharing scheme based on MSP’, Inf. Sc., 2011, 181, (7), pp. 14031409 (doi: 10.1016/j.ins.2010.11.032).
    23. 23)
      • 18. Shao, J., Cao, Z.: ‘A traceable threshold signature scheme with multiple signing policies’, Comput. Secur., 2006, 25, (3), pp. 201206 (doi: 10.1016/j.cose.2005.11.006).
    24. 24)
      • 10. Liu, N., Li, J.H., Hao, L.M., Wu, Y., Yi, P.: ‘Group-based trust model in P2P system based on trusted computing’. Int. Conf. on Computer Science and Software Engineering, 2008, pp. 797801.
    25. 25)
      • 25. Carlo, B., Alfredo, D.S., Giovanni, D.C., Antonio, G.G., Ugo, V.: ‘Multi-secret sharing schemes’. Adv. Cryptology – CRYPTO'94, 1994(LNCS, 839), pp. 150163.
    26. 26)
      • 9. Tian, C.Q., Jiang, J.H., Hu, Z.G., Li, F.: ‘A novel super-peer based trust model for peer-to-peer networks’, Chin. J. Comput., 2010, 33, (2), pp. 345355 (doi: 10.3724/SP.J.1016..2010.00345).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2012.0350
Loading

Related content

content/journals/10.1049/iet-ifs.2012.0350
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading