A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP
**

Posts: 694
Joined: Nov 2009
#1
13-01-2010, 07:57 AM


A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Abstract”Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a

secure and efficient threshold-multisignature scheme. The paper uniquely defines the fundamental properties of thresholdmultisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject. The efficiency of the proposed scheme is analyzed and shown to be superior to its counterparts. The paper also proposes a discrete logarithm based distributed-key management infrastructure (DKMI), which consists of a round optimal, publicly verifiable, distributed-key generation (DKG) protocol and a one round, publicly verifiable, distributed-key redistribution/updating (DKRU) protocol. The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first round, thus avoiding multiple protocol executions.

Technology to use: JAVA/ 2007
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#2
02-04-2010, 10:29 AM

INTRODUCTION
IN distributed systems it is sometimes necessary for users to share the power to use a cryptosystem . The system secret is divided up into shares and securely stored by the entities forming the distributed cryptosystem. The main advantage of a distributed cryptosystem is that the secret is never computed, reconstructed, or stored in a single location, making the secret more difficult to compromise . In many applications, a threshold ðtÞ or more shareholders are required to cooperatively generate a digital signature, in contrast to the conventional single signer. This may also be seen as a distribution of trust since the shareholders must collaborate and contribute equally to produce a valid multiparty signature. Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes . In the literature, thresholdmultisignature schemes are also referred to as threshold signature schemes with traceability . The combined properties guarantee the signature verifier that at least t members participated in the generation of the group-oriented signature and that the identities of the signers can be easily established. The majority of the existing threshold-multisignature schemes belong to variants of the single signatory, generalized ElGamal signatures extended to a group/multiparty setting.


Presented By:
Johann van der Merwe, Dawoud S. Dawoud, Member, , and Stephen McDonald,


read full report
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.106.7299&rep=rep1&type=pdf
doi.ieeecomputersociety10.1109/TPDS.2007.1005
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
anithahs
Active In SP
**

Posts: 1
Joined: Jun 2010
#3
08-06-2010, 05:24 PM

sir could you please help me out to do this project and implimentation reort has i have this project and implimentation code
[/size]
hi. could you please help me to do this project and implimentation reort......
Reply
seminars on demand
Active In SP
**

Posts: 201
Joined: Jun 2010
#4
09-06-2010, 10:50 AM

You can take any project and implimentation report from this site and take it as a guide for your report. You can see what all headings to divide the report into. You should download the report pdf in this thread and can follow its introduction and all.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#5
01-10-2010, 09:59 AM


.docx   THRESHOLD_MULTISIGNATURE SCHEME.docx (Size: 17.34 KB / Downloads: 69)
A FULLY DISTRIBUTED PROACTIVELY SECURE THRESHOLD_MULTISIGNATURE SCHEME


INTRODUCTION

The main objective of this paper is to propose such a secure and efficient threshold¬_ Multisignature scheme. The paper uniquely defines the fundamental properties of Threshold_multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject.
Threshold-Multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold or more group members to collaboratively sign an arbitrary message.
EXISTING SYSTEM:

In many applications, a threshold or more shareholders are required to cooperatively generate a digital signature, in contrast to the conventional single signer. This may also be seen as a distribution of trust since the shareholders must collaborate and contribute equally to produce a valid multiparty signature.
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes. In the literature, threshold multisignature schemes are also referred to as threshold signature schemes with traceability. The combined properties guarantee the signature verifier that at least t members participated in the generation of the group-oriented signature and that the identities of the signers can be easily established. The majority of the existing threshold-multisignature schemes belong to variants of the single signatory, generalized ElGamal signatures extended to a group/multiparty set
Reply
kolteprashant
Active In SP
**

Posts: 4
Joined: Jul 2010
#6
20-01-2011, 06:51 PM

plz sends a full report for A Fully Distributed Proactively Secure Threshold – Multisignature +Scheme this pooject
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#7
22-01-2011, 12:12 PM

you may ignored the previous page. please click on the below link

topicideashow-to-a-fully-distributed-proactively-secure-threshold-multisignature-scheme--5880?pid=25413#pid25413
Reply
kolteprashant
Active In SP
**

Posts: 4
Joined: Jul 2010
#8
29-01-2011, 05:13 PM

hello sir ,
can u send the project and implimentation report and the code for this project and implimentation A Fully Distributed Proactively Secure Threshold-Multisignature Scheme.......................
Reply
gauravbunks
Active In SP
**

Posts: 1
Joined: Aug 2010
#9
20-04-2011, 01:05 AM

anyone can pls send me the complete source code of this project and implimentation...i will be very grateful...
my mailid is... gauraveek@gmail.com
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#10
23-02-2012, 04:06 PM


to get information about the topic A Fully Distributed Proactively Secure Threshold-Multisignature Scheme full report ppt and related topic refer the link bellow
topicideashow-to-a-fully-distributed-proactively-secure-threshold-multisignature-scheme--5880
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#11
29-02-2012, 02:41 PM

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme


.pdf   MultiSignatureScheme.pdf (Size: 1.15 MB / Downloads: 20)
INTRODUCTION
IN distributed systems it is sometimes necessary for users
to share the power to use a cryptosystem [1], [2]. The
system secret is divided up into shares and securely stored
by the entities forming the distributed cryptosystem. The
main advantage of a distributed cryptosystem is that the
secret is never computed, reconstructed, or stored in a
single location, making the secret more difficult to
compromise [3].



2 PROPOSED THRESHOLD-MULTISIGNATURE
SCHEME

In this section, a novel threshold-multisignature scheme,
without assistance from a trusted key distribution center
(KDC), is proposed. The scheme consists of the following
six parts (Section 2.1 through Section 2.6):

2.1 System Parameter Setup
The group members Pi, for i ¼ 1 : n, agree on and publish
the following system parameters:
. p; q two large primes such that q j ðp  1Þ,
. g generator of the cyclic subgroup of order q in ðZÞ
p,
. HðÞ collision-free one-way hash function,
. ðn; tÞ threshold parameter t and total number of
group members n, and
. T threshold cryptosystem secret update period.
Protocol participants Pi, for i ¼ 1 : n, are assumed to have a
long-term public/private key pair PKi=SKi and an
authentic certificate, verifiable with the public key of a
common trusted third party. The certificate of Pi binds the
public key PKi ¼ gSKi to user Pi’s identity IDi. The
certificates are distributed to (or can be traced by) all
communication entities Pj, for j ¼ 1 : n, j 6¼ i.

2.2 Initial Publicly Verifiable Distributed-Key
Generation
In this section, a publicly verifiable distributed-key generation
(DKG) protocol is presented. The round optimal DKG
protocol is developed from the scheme of Zhang and Imai
[17]. The purpose of the protocol is to realize secure, initial
secret sharing to an access structure n;t
P , without a trusted
dealer or KDC.
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#12
07-03-2012, 02:35 PM

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme


.pdf   MultiSignatureScheme.pdf (Size: 1.15 MB / Downloads: 23)


INTRODUCTION
IN distributed systems it is sometimes necessary for users
to share the power to use a cryptosystem [1], [2]. The
system secret is divided up into shares and securely stored
by the entities forming the distributed cryptosystem. The
main advantage of a distributed cryptosystem is that the
secret is never computed, reconstructed, or stored in a
single location, making the secret more difficult to
compromise [3].
In many applications, a threshold ðtÞ or more shareholders
are required to cooperatively generate a digital
signature, in contrast to the conventional single signer. This
may also be seen as a distribution of trust since the
shareholders must collaborate and contribute equally to
produce a valid multiparty signature.



2 PROPOSED THRESHOLD-MULTISIGNATURE
SCHEME

In this section, a novel threshold-multisignature scheme,
without assistance from a trusted key distribution center
(KDC), is proposed. The scheme consists of the following
six parts (Section 2.1 through Section 2.6):
2.1 System Parameter Setup
The group members Pi, for i ¼ 1 : n, agree on and publish
the following system parameters:
. p; q two large primes such that q j ðp  1Þ,
. g generator of the cyclic subgroup of order q in ðZÞ
p,
. HðÞ collision-free one-way hash function,
. ðn; tÞ threshold parameter t and total number of
group members n, and
. T threshold cryptosystem secret update period.
Protocol participants Pi, for i ¼ 1 : n, are assumed to have a
long-term public/private key pair PKi=SKi and an
authentic certificate, verifiable with the public key of a
common trusted third party. The certificate of Pi binds the
public key PKi ¼ gSKi to user Pi’s identity IDi. The
certificates are distributed to (or can be traced by) all
communication entities Pj, for j ¼ 1 : n, j 6¼ i.
2.2 Initial Publicly Verifiable Distributed-Key
Generation

In this section, a publicly verifiable distributed-key generation
(DKG) protocol is presented. The round optimal DKG
protocol is developed from the scheme of Zhang and Imai
[17]. The purpose of the protocol is to realize secure, initial
secret sharing to an access structure n;t
P , without a trusted
dealer or KDC.



Attacks on Threshold-Multisignature Schemes
4.4.1 Collusion Attack

A collusion attack enables dishonest group members (and/or
a designated clerk or combiner node: see Section 4.5) that
work together to control the group key.
Wang et al. [25] report a collusion attack on the thresholdmultisignature
scheme (without a trusted third party)
presented by Li et al. in [8]. Wang et al. [25] propose some
countermeasures against the attack. The first solution
requires each member to publish its public value yi
simultaneously to mitigate the rushing attack on the group
secret. This solution is impractical since there is no method in
existing networking protocols of accommodating n simultaneous
broadcasts nor can devices receive n simultaneous
messages without advanced hardware. Any network participant
will therefore always be able to make a legitimate
excuse for a late arriving public value. The second proposed
solution requires members to commit to their public values
and then open their commitments to reveal the public values.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,745 09-12-2014, 09:25 PM
Last Post: Guest
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 720 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering report seminar projects maker 0 455 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Energy-Sustainable Framework and Performance Analysis of Power Scheme pdf seminar projects maker 0 258 12-09-2013, 02:51 PM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 365 09-09-2013, 03:32 PM
Last Post: study tips
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 429 29-08-2013, 02:15 PM
Last Post: study tips
  Secure Access for MANET Using Authorization Enforcement Facility Report study tips 0 336 27-08-2013, 12:56 PM
Last Post: study tips
  Toward publicly auditable secure cloud data storage services Abstract study tips 0 325 16-08-2013, 04:59 PM
Last Post: study tips
  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Abstract study tips 0 350 16-08-2013, 04:57 PM
Last Post: study tips
  A New Approach for Secure Data Transfer based on Wavelet Transform Report study tips 0 390 02-08-2013, 04:15 PM
Last Post: study tips