Two Efficient Digital Multisignature Schemes

被引:1
|
作者
Chu, Hongwei [1 ]
Zhao, Yinliang [1 ]
机构
[1] Xi An Jiao Tong Univ, Inst Neocomp, Xian 710049, Peoples R China
关键词
D O I
10.1109/ISCID.2008.204
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on Schnorr algorithm, by adopting ID code and time-limit approaches, propose two multisignature schemes which can prevent repeated broadcast attack and malicious delay in the process. For most of the computational effort for signature generation can be done in preprocessing stage, both identification and signature with high efficiency, and it's security is based on the difficulty of discrete logarithms problem. In the end, analyze the two schemes' security and efficiency in detail.
引用
收藏
页码:258 / 261
页数:4
相关论文
共 50 条
  • [1] Two efficient RSA digital multisignature and blind multisignature schemes
    Aboud, SJ
    Al-Fayoumi, MA
    [J]. Proceedings of the IASTED International Conference on Computational Intelligence, 2005, : 359 - 362
  • [2] Digital multisignature schemes for authenticating delegates in mobile code systems
    Shieh, SP
    Lin, CT
    Yang, WB
    Sun, HM
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2000, 49 (04) : 1464 - 1473
  • [3] Cryptanalysis of two multisignature schemes with distinguished signing authorities
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 492 - +
  • [4] Efficient proxy multisignature schemes based on the elliptic curve cryptosystem
    Chen, TS
    Chung, YF
    Huang, GS
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 527 - 534
  • [5] Two threshold multisignature schemes from bilinear pairings
    Li, Guowen
    Yu, Jia
    Li, Rupeng
    Li, Daxing
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1041 - +
  • [6] Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
    Wu, TC
    Hsu, CL
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2003, 52 (02) : 462 - 465
  • [7] Cryptanalyzing the Efficient Identity-Based RSA and GQ Multisignature Schemes
    Goh, Weihan
    Yeo, Chai Kiat
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 875 - 880
  • [8] On the security of probabilistic multisignature schemes and their optimality
    Komano, Y
    Ohta, K
    Shimbo, A
    Kawamura, S
    [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 132 - 150
  • [9] Key Substitution Attacks on Multisignature Schemes
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 244 - 245
  • [10] Digital signature/multisignature schemes giving public key verification and message recovery simultaneously
    Wu, TC
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (06): : 329 - 337