Improvement of an efficient ID-based RSA multisignature

被引:2
|
作者
Yang, Fuw-Yi [1 ]
Lo, Jeng-Hung [1 ]
Liao, Cai-Ming [1 ]
机构
[1] Chaoyang Univ Technol, Taichung 41349, Taiwan
关键词
Multisignature; ID-based RSA signature;
D O I
10.1109/CISIS.2010.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, Harn and Ren proposed an effective RSA multisignature scheme based on the identity-based signature (IBS) scheme of Shamir. In spite of being a multisignature, the signature length of Harn and Ren's scheme is comparable to that in Shamir's IBS scheme. Also, only two/one extra increments of l-1 modular multiplications are added to the signature/verification time, whereby l represents the number of signers. This enabled a large reduction of computational load and communication costs compared to the multisignature schemes formerly proposed. However, we discovered two security loopholes in their schemes. The purpose of this paper is to analyze and highlight the origins of the loopholes, as well as to put forth proposed improvements, preserve the merits of the original schemes, and enhance their security. The resultant protocol thus is suitable for wireless communications because it is not only possessing security but also saving computation resources and communication bandwidth.
引用
收藏
页码:822 / 826
页数:5
相关论文
共 50 条
  • [41] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [42] Efficient ID-based digital signatures with message recovery
    Tso, Raylin
    Gu, Chunxiang
    Okamoto, Takeshi
    Okamoto, Eiji
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 47 - +
  • [43] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [44] Efficient searchable ID-based encryption with a designated server
    Tsu-Yang Wu
    Tung-Tso Tsai
    Yuh-Min Tseng
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 391 - 402
  • [45] An ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 18 - +
  • [46] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [47] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [48] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [49] Efficient hybrid encryption from ID-based encryption
    Masayuki Abe
    Yang Cui
    Hideki Imai
    Eike Kiltz
    [J]. Designs, Codes and Cryptography, 2010, 54 : 205 - 240
  • [50] ID-based series-parallel multisignature schemes for multi-messages from bilinear maps
    Wang, Lihua
    Okamoto, Eiji
    Miao, Ying
    Okamoto, Takeshi
    Doi, Hiroshi
    [J]. CODING AND CRYPTOGRAPHY, 2006, 3969 : 291 - 303