CFP last date
15 January 2025
Call for Paper
February Edition
IJAIS solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 15 January 2025

Submit your paper
Know more
Reseach Article

An Organizational Signature Schemes based on ElGamal Signature

by Ali M. Allam
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 4
Year of Publication: 2016
Authors: Ali M. Allam
10.5120/ijais2016451483

Ali M. Allam . An Organizational Signature Schemes based on ElGamal Signature. International Journal of Applied Information Systems. 10, 4 ( January 2016), 6-9. DOI=10.5120/ijais2016451483

@article{ 10.5120/ijais2016451483,
author = { Ali M. Allam },
title = { An Organizational Signature Schemes based on ElGamal Signature },
journal = { International Journal of Applied Information Systems },
issue_date = { January 2016 },
volume = { 10 },
number = { 4 },
month = { January },
year = { 2016 },
issn = { 2249-0868 },
pages = { 6-9 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number4/851-2016451483/ },
doi = { 10.5120/ijais2016451483 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:22.867615+05:30
%A Ali M. Allam
%T An Organizational Signature Schemes based on ElGamal Signature
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 4
%P 6-9
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We introduce the notation of organizational signature. This new scheme has a valuable property that assures, that if a message is signed in an organization transaction, the corresponding signature will be differentiated between the personal signature of the employee and his affiliation signature. This adds to the binding between the employee and his affiliation. Due to this signature, an organization, e.g. company, can create different signatures related to each position. In this paper, we introduce the notion of organizational signature scheme; show a construction of organizational signature schemes based on the ElGamal signature on the standard model.

References
  1. Allam, A. M., Ali, I. A., and Mahgoub, S. M., "A provably secure certificateless organizational signature schemes," International Journal Communication System, 2015. DOI: 10.1002/dac.3038.
  2. Chaum, and van Heyst, "Group signatures," Advances in Cryptology — EUROCRYPT ’91, Lecture Notes in Computer Science 547, pp. 257–265, 1991.
  3. David Chaum, and Hans van Antwerpen, "Undeniable Signatures," Crypto'89, LNCS 435, Springer-Verlag, pp. 212-216, Berlin 1990.
  4. Wang, Kerui, Qiuliang Xu, and Guoyan Zhang. "A Secure Threshold Signature Scheme from Lattices." Computational Intelligence and Security (CIS), 2013 9th International Conference on. IEEE, Dec. 2013.
  5. Limin Sha. "Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme." Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on. IEEE, July 2014.
  6. T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol.IT-31, pp. 469-472, 1985.
  7. Diffie, W.; Hellman, M.E., "New directions in cryptography," in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976.
  8. Hung-Zih Liao, and Yuan-Yuan Shen, "On the Elliptic Curve Digital Signature Algorithm," Tunghai Science Vol.8, pp. 109-126, July 2006.
  9. F. Vercauteren, "Elliptic Curve Discrete Logarithm Problem", [Online], Kotholieke Universiteit Leuven, 2005,Available:http://homes.esat.kuleuven.be/~fvercaut/talks/ECDL.pdf.
  10. J. Kar, "Proxy Blind Multi-signature Scheme using ECC for handheld devices," Available at “International Association for Cryptology Research”, http://eprint.iacr.org/2011/043.pdf, 2011.
  11. A. Menezes, P. C Van Oorschot and S. A Vanstone Handbook of applied cryptography. CRC Press, 1997.
  12. B. Yu, "Establishment of elliptic curve cryptosystem," IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 1165–1167, December 2010.
  13. S. K. Nayak, B. Majhi, and S. Mohanty, ”An ECDLP based untraceable blind signature scheme,” Second IEEE International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 829 - 834, 20-21 March 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Organizational signature; public key cryptography; discrete logarithm problem