CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication

by Sharavanan Thanasekkaran, Balasubramanian V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 8
Year of Publication: 2011
Authors: Sharavanan Thanasekkaran, Balasubramanian V
10.5120/2450-2548

Sharavanan Thanasekkaran, Balasubramanian V . A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication. International Journal of Computer Applications. 20, 8 ( April 2011), 49-52. DOI=10.5120/2450-2548

@article{ 10.5120/2450-2548,
author = { Sharavanan Thanasekkaran, Balasubramanian V },
title = { A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 8 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 49-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number8/2450-2548/ },
doi = { 10.5120/2450-2548 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:19.450145+05:30
%A Sharavanan Thanasekkaran
%A Balasubramanian V
%T A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 8
%P 49-52
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we propose a threshold digital signature scheme by using RSA cryptography to authenticate multimedia content. Multimedia authentication deals with genuineness of the structure and content of the multimedia such as text, image, audio, video etc. The proposed scheme uses an efficient key distribution scenario where, the private key of the group is distributed as unique shares among the group members. The shares are calculated and distributed based on the ID of the group members by using efficient Shamir’s secret sharing scheme. For convenience the group members can be dynamically added or deleted. The private key of the group is updated if there is any violation in the threshold limit t due to variation of the number of group members in the group. The signer in the group will be able to reconstruct the private key from t or more shares given by the group members to sign the multimedia document. In this scheme any t or more group members can cooperatively generate the group signature where t-1 or fewer cannot do it. This scheme is also secure against conspiracy attack.

References
  1. Ching-Yung Lin and Shih-Fu Chang. 2003 Robust Digital Signature for Multimedia Authentication: A Summary in Info lab Technical Report Series, no. 17.
  2. N. Gupta Kailash, N. Agarwala Kamlesh, and A. Agarwala Prateek Digital Signature: Network Security Practices. ISBN 81-203-2599-0.
  3. Danni Liu, XingweiWang, Lei Guo, and Min Huang. 2007 A Dynamic (t, n) Threshold Signature Scheme with Provable Security in IEEE International conference on Future Computer and Communication, pages V3–322–V3–325.
  4. Raman Kumar and Harsh Kumar Verma.2010 An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers in IEEE 2nd International Conference on Advance Computing Conference (IACC), pages 293–298, 2010.
  5. W. Xiaoming, Z. Zhen, and F. Fangwei. 2006 A Secure Threshold Proxy Signature Scheme in Journal of Electronics and Information Technology, 28:1308–1311.
  6. C. Wang, C. Chang, and C. Lin. 2000 Generalization of threshold signature and authenticated encryption for group communications in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 83:1228–1237.
  7. G. Li, X. Xin, and W. Li. 2008 Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme in proceedings on International Conference on Computational Intelligence and Security, 2:342–346.
  8. J. Lee. Threshold signature scheme with multiple signing policies in Proceedings-Computers and Digital Techniques, 148:95– 99.
  9. Adi Shamir. 1979 How to Share a Secret in Communications of the ACM, 22:612–613.
  10. Feng Shen, Chonglei Mei, and Hai Jiang. Secret Sharing with Extended Coefficient Use for Improved Data Capacity in IEEE SoutheastCon 2010, pages 119–122.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature Threshold Signature Multimedia Authentication RSA Secret Sharing