Improvement of an efficient ID-based RSA multisignature

被引:2
|
作者
Yang, Fuw-Yi [1 ]
Lo, Jeng-Hung [1 ]
Liao, Cai-Ming [1 ]
机构
[1] Chaoyang Univ Technol, Taichung 41349, Taiwan
关键词
Multisignature; ID-based RSA signature;
D O I
10.1109/CISIS.2010.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, Harn and Ren proposed an effective RSA multisignature scheme based on the identity-based signature (IBS) scheme of Shamir. In spite of being a multisignature, the signature length of Harn and Ren's scheme is comparable to that in Shamir's IBS scheme. Also, only two/one extra increments of l-1 modular multiplications are added to the signature/verification time, whereby l represents the number of signers. This enabled a large reduction of computational load and communication costs compared to the multisignature schemes formerly proposed. However, we discovered two security loopholes in their schemes. The purpose of this paper is to analyze and highlight the origins of the loopholes, as well as to put forth proposed improvements, preserve the merits of the original schemes, and enhance their security. The resultant protocol thus is suitable for wireless communications because it is not only possessing security but also saving computation resources and communication bandwidth.
引用
收藏
页码:822 / 826
页数:5
相关论文
共 50 条
  • [1] Improving an efficient ID-based RSA multisignature
    Yang, Fuw-Yi
    Lo, Jeng-Hung
    Liao, Cai-Ming
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (02) : 249 - 254
  • [2] Improving an efficient ID-based RSA multisignature
    Fuw-Yi Yang
    Jeng-Hung Lo
    Cai-Ming Liao
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2013, 4 : 249 - 254
  • [3] Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature
    Liu, Chenglian
    Rafsanjani, Marjan Kuchaki
    Zheng, Liyun
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 534 - +
  • [4] ID-based structured multisignature schemes
    Lin, CY
    Wu, TC
    Hwang, JJ
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 45 - 59
  • [5] ID-based digital multisignature scheme
    Dept. of Comp. Sci. and Engineering, South China University of Technology, Guangzhou, Guangdong Province 510640, China
    不详
    [J]. J. Circuits Syst. Comput., 3-4 (223-227):
  • [6] ID-based digital multisignature scheme
    Tang, SH
    Wei, G
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (3-4) : 223 - 227
  • [7] Efficient ID-based multiproxy multisignature without bilinear maps in ROM
    Namita Tiwari
    Sahadeo Padhye
    Debiao He
    [J]. annals of telecommunications - annales des télécommunications, 2013, 68 : 231 - 237
  • [8] Efficient ID-based multiproxy multisignature without bilinear maps in ROM
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    [J]. ANNALS OF TELECOMMUNICATIONS, 2013, 68 (3-4) : 231 - 237
  • [9] Known Signature Attack of ID-based Multisignature Schemes
    Yang, Wu-Chuan
    Jhou, Jhih-Syue
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 341 - +
  • [10] Two ID-based multisignature protocols for sequential and broadcasting architectures
    Wu, TC
    Chou, SL
    Wu, TS
    [J]. COMPUTER COMMUNICATIONS, 1996, 19 (9-10) : 851 - 856