Full Paper View Go Back

Braid Group Based Nominative Proxy Signature Scheme

Vandani Verma1

1 Amity Institute of Applied Sciences, Amity University, Noida, INDIA.

Correspondence should be addressed to: vandaniverma@yahoo.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.3 , pp.57-60, Jun-2017

Online published on Jun 30, 2017


Copyright © Vandani Verma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vandani Verma , “Braid Group Based Nominative Proxy Signature Scheme,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.57-60, 2017.

MLA Style Citation: Vandani Verma "Braid Group Based Nominative Proxy Signature Scheme." International Journal of Scientific Research in Network Security and Communication 5.3 (2017): 57-60.

APA Style Citation: Vandani Verma , (2017). Braid Group Based Nominative Proxy Signature Scheme. International Journal of Scientific Research in Network Security and Communication, 5(3), 57-60.

BibTex Style Citation:
@article{Verma_2017,
author = {Vandani Verma },
title = {Braid Group Based Nominative Proxy Signature Scheme},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {57-60},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=271},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=271
TI - Braid Group Based Nominative Proxy Signature Scheme
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Vandani Verma
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 57-60
IS - 3
VL - 5
SN - 2347-2693
ER -

1761 Views    543 Downloads    411 Downloads
  
  

Abstract :
Braid groups are highly non-commutative groups, they can be found in our daily life in jewellery, in hair braid and in many more. Nominative proxy signatures is a special type of proxy signatures in which the original signer delegates his signing rights to proxy signer and proxy signer on behalf of the original signer generates the signatures intended for nominee in such a way that only the nominee can verify the signatures and if required he is the only one to prove the validity of the signatures to third party. These signatures are different from designated verifier signatures as the validity of the signatures can be proved to third party when asked. In this paper, we combine the two concepts nominative proxy and braid groups and present the maiden nominative proxy signatures based on braid groups. We also analyse the security aspects of the proposed scheme and showed that the conjugacy decomposition problem, conjugacy search problem and base problem 1 in braids are not solvable for the proposed scheme.

Key-Words / Index Term :
nominative proxy signatures, braid group, conjugacy search problem

References :
[1]. E. Artin, “The theory of braids”, American Scientist, Vol.38, Issue.1, pp.112-119, 1950.
[2]. GK Verma, “A Proxy Signature Scheme over Braid Groups”, Cryptology ePrint Archive Report, India, pp.1-47, 2008.
[3]. GK. Verma, “A Proxy Blind Signature Scheme over Braid Groups”, International Journal of Network Security, Vol.9, No.3, pp.214-217, 2009.
[4]. I.A. Ismail, S.F. El-Zoghdy, A.A. Abdo, “A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems”, International Journal of Advanced Networking and applications, vol.2, Issue.1, pp.411-418, 2010.
[5]. M. Mambo, K. Usuda, E. Okamoto, “Proxy Signatures- Revisited”, In Proc. Of ICICS (LNCS 1334), Berlin, pp.223-232, 1997.
[6]. SJ Kim, SJ Park, DH Won, “Won Zero knowledge Nominative Signatures”, International Conference on the Theory and Applications of cryptography, Vol.95, Issue.7, pp.380-392, 1996.
[7]. A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[8]. Xiang-jun XIN, Mei-zhi WANG, Guo-zhen XIAO., “A (k, n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce”, Journal of China University of Mining and Technology, Vol.16, Issue.4, pp.470-474 2006.
[9]. Zuo-Wen Tan, Tan Liu, Zhuo-Jun Liu, “Nominative proxy signature schemes”, Cryptography eprint Archive Report, US, pp.1-128, 2004.
[10]. LiCheng Wang, LiHua Wang, ZhenFu Cao, YiXian Yang, XinXin Niu, “Conjugate adjoining problem in braid groups and new design of braid-based signatures”, Science China information sciences, Vol. 53, Issue.3, pp.524-536, 2010.
[11]. V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation