ElGamal-like digital signature and multisignature schemes using self-certified public keys

被引:20
|
作者
Chang, YS [1 ]
Wu, TC [1 ]
Huang, SC [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
关键词
digital signature; multisignature; self-certified public key; factorization; discrete logarithm; active attack;
D O I
10.1016/S0164-1212(99)00080-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we first present a digital signature scheme using self-certified public key. Subsequently, we present a digital multisignature scheme extended from the proposed digital signature. Both the proposed schemes have the advantage that the authentication of the public key can be accomplished with the verification of the signature or multisignature. The security of both the proposed schemes is based on the one-way hash function, the factorization and the discrete logarithm assumptions. Moreover, the proposed multisignature scheme preserves the main merits inherent in most of the previously developed schemes. We also demonstrate that the proposed multisignature scheme can withstand the active attack that some malicious impostors try to universally forge an individual signature or a multisignature for a given message that is rejected to be signed by the other co-signers. (C) 2000 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 50 条
  • [1] Repairing ElGamal-like multi-signature schemes using self-certified public keys
    Hwang, SH
    Lee, YH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 156 (01) : 73 - 83
  • [2] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [3] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [4] Improvement of efficient proxy signature schemes using self-certified public keys
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 222 - 234
  • [5] Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    Tsai, Pei-Ling
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 914 - 924
  • [6] Threshold signature scheme using self-certified public keys
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 89 - 97
  • [7] Proxy signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1380 - 1389
  • [8] Digital signature with message recovery using self-certified public keys and its variants
    Tseng, YM
    Jan, JK
    Chien, HY
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 203 - 214
  • [10] A threshold proxy signature scheme using self-certified public keys
    Xue, QS
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 715 - 724