A structured ElGamal-type multisignature scheme

被引:0
|
作者
Burmester, M
Desmedt, Y
Doi, H
Mambo, M
Okamoto, E
Tada, M
Yoshifuji, Y [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[3] Okayama Univ, Fac Sci, Dept Math, Okayama 700, Japan
[4] Tohoku Univ, Educ Ctr Informat Proc, Sendai, Miyagi 980, Japan
[5] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
[6] Univ Wisconsin, Ctr Cryptog Comp & Network Secur, Milwaukee, WI 53201 USA
来源
PUBLIC KEY CRYTOGRAPHY | 2000年 / 1751卷
关键词
multisignature; structured multisignature; group structure; series-parallel graph; ElGamal signature;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a structured multisignature scheme which is based on a modified ElGamal signature scheme and analyze its security. The structure takes into account the order of the signers. With serial structures, different signing orders produce different multisignatures. In contrast, with parallel structures the multisignatures are independent of the signing order. Our structured multisignatures can deal with structures which are composed of serial and parallel signing orders. We give reductions for the security of the proposed scheme, and for the specified order of the signers in the serial and mixed cases.
引用
收藏
页码:466 / 483
页数:18
相关论文
共 50 条
  • [21] Forgery attack to ElGamal type message recovery digital signature scheme
    Li, Zichen
    Yang, Yixian
    Wu, Weiling
    Chinese Journal of Electronics, 1999, 8 (04): : 379 - 381
  • [22] A Multisignature Scheme Based on the SDLP and on the IFP
    Duran Diaz, R.
    Hernandez Encinas, L.
    Munoz Masque, J.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 135 - 142
  • [23] Delegated multisignature scheme with document decomposition
    Wu, TC
    Huang, CC
    Guan, DJ
    JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 55 (03) : 321 - 328
  • [24] An efficient ElGamal cryptosystem scheme
    Hussein H.I.
    Abduallah W.M.
    International Journal of Computers and Applications, 2021, 43 (10) : 1088 - 1094
  • [25] An anonymous but accountable proxy multisignature scheme
    Du, He
    Wang, Jian
    Journal of Software, 2013, 8 (08) : 1867 - 1874
  • [26] A new type of digital multisignature
    Wang, YL
    Wang, LH
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 750 - 754
  • [27] Security of a multisignature scheme for specified group of verifiers
    Lv, JQ
    Wang, XM
    Kim, K
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 58 - 63
  • [28] Attribute Based Multisignature Scheme for Wireless Communications
    Liu, Ximeng
    Zhu, Hui
    Ma, Jianfeng
    Li, Qi
    Xiong, Jinbo
    MOBILE INFORMATION SYSTEMS, 2015, 2015 : 1 - 11
  • [29] Multisignature Scheme Based on the Generalized Conic Curve
    Lin, Song
    Wang, Biao
    Li, Zhoujun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01) : 57 - 58
  • [30] On the Security of a Variant of ElGamal Encryption Scheme
    Rao, Fang-Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 725 - 728