ID-based structured multisignature schemes

被引:0
|
作者
Lin, CY [1 ]
Wu, TC [1 ]
Hwang, JJ [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
关键词
multisignature; structured multisignature; ID-based public key; signing structure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The signing structure of a multisignature scheme specifies the signing order for all signers when signing messages, and any multisignature not obeying the specified signing order will be verified as invalid. In accordance with the different responsibilities of the participant signers, the signing structure of a multisignature scheme could be further classified as the following three types: serial, parallel and mixed, where the mixed structure is regarded as the mix of the serial and the parallel, Based on the well-known ID-based public key system, we will propose three ID-based structured multisignature schemes and each scheme respectively realizes the serial, parallel and mixed signing structures. In the proposed schemes, the length of a multisignature is fixed and the verification of a multisignature is efficient, regardless of the number of signers involved, Besides, any invalid partial multisignature can be effectively identified during the generation of the multisignature.
引用
收藏
页码:45 / 59
页数:15
相关论文
共 50 条
  • [41] Hierarchical ID-based cryptography
    Gentry, C
    Silverberg, A
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
  • [42] ID-based group signature
    Electronics and Telecommunications, Research Inst, Taejon, Korea, Republic of
    Electron Lett, 19 (1616-1617):
  • [43] Constructing Certificate less Encryption and ID-Based Encryption from ID-Based Key Agreement
    Fiore, Dario
    Gennaro, Rosario
    Smart, Nigel P.
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 167 - +
  • [44] ID-based ring signature and proxy ring signature schemes from bilinear pairings
    Department of Mathematics, Pranveer Singh Institute of Technology, Kalpi Road, Bhauti, Kanpur, India
    不详
    Int. J. Netw. Secur., 2007, 2 (187-192):
  • [45] Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model
    Zhang, Mingwu
    Li, Pengcheng
    Yang, Bo
    Wang, Hao
    Takagi, Tsuyoshi
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 98 - +
  • [46] On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [47] On the security of Kim et al. two ID-based broadcast signcryption schemes
    Zhang, Jianhong
    Tang, Wenjing
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1509 - 1514
  • [48] On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems
    Dheerendra Mishra
    Journal of Medical Systems, 2015, 39
  • [49] ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
    Su, PC
    Chang, HKC
    Lu, EH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (03) : 757 - 772
  • [50] Towards Efficient ID-based Signature Schemes with Batch Verifications from Bilinear Pairings
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 935 - 940