ID-based structured multisignature schemes

被引:0
|
作者
Lin, CY [1 ]
Wu, TC [1 ]
Hwang, JJ [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
关键词
multisignature; structured multisignature; ID-based public key; signing structure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The signing structure of a multisignature scheme specifies the signing order for all signers when signing messages, and any multisignature not obeying the specified signing order will be verified as invalid. In accordance with the different responsibilities of the participant signers, the signing structure of a multisignature scheme could be further classified as the following three types: serial, parallel and mixed, where the mixed structure is regarded as the mix of the serial and the parallel, Based on the well-known ID-based public key system, we will propose three ID-based structured multisignature schemes and each scheme respectively realizes the serial, parallel and mixed signing structures. In the proposed schemes, the length of a multisignature is fixed and the verification of a multisignature is efficient, regardless of the number of signers involved, Besides, any invalid partial multisignature can be effectively identified during the generation of the multisignature.
引用
收藏
页码:45 / 59
页数:15
相关论文
共 50 条
  • [21] Security Vulnerability of ID-Based Key Sharing Schemes
    Hwang, JungYeon
    Youn, Taek-Young
    Susilo, Willy
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10): : 2641 - 2643
  • [22] ID-based secure PIM-SM schemes
    Zhang, Junqi
    Varadharajan, Vijay
    Mu, Yi
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 190 - +
  • [23] ID-based cryptographic schemes based on factoring and discrete logarithms
    Su, PC
    Lu, EH
    Chang, HKC
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 556 - 563
  • [24] On the sequentiality of three optimal structured multisignature schemes
    Shao, Zuhua
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 105 - 115
  • [25] New ID-Based Blind Signature Schemes with Message Recovery
    Zheng, Yanbin
    Zhang, Yuting
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023
  • [26] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [27] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [28] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [29] ID-based transitive signature schemes without random oracle
    Ma, Xiao-Long
    Gu, Li-Ze
    Cui, Wei
    Yang, Yi-Xian
    Hu, Zheng-Ming
    Tongxin Xuebao/Journal on Communications, 2010, 31 (05): : 37 - 43
  • [30] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988