Digital multisignature schemes for authenticating delegates in mobile code systems

被引:28
|
作者
Shieh, SP [1 ]
Lin, CT [1 ]
Yang, WB [1 ]
Sun, HM [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
authentication; digital signature; management of mobile services; security;
D O I
10.1109/25.875284
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature scheme, two digital multisignature schemes are proposed: the parallel multisignature scheme and the serial multisignature scheme. The parallel multisignature scheme allows each user to sign the same message separately and independently, and then combines all individual signatures into a multisignature, The serial multisignature scheme allows a group of users to sign the message serially, and does not need to predetermine the signing order. Both multisignature schemes tan withstand the attacks that aim to forge the signatures or to get the private kegs of the signers.
引用
收藏
页码:1464 / 1473
页数:10
相关论文
共 50 条
  • [1] Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
    Wu, TC
    Hsu, CL
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2003, 52 (02) : 462 - 465
  • [2] Forgery attacks on "Multisignature, schemes for authenticating mobile code delegates"
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2002, 51 (06) : 1669 - 1671
  • [3] Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems
    Yi, X
    Kheong, C
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2002, 51 (06) : 1313 - 1315
  • [4] Two efficient RSA digital multisignature and blind multisignature schemes
    Aboud, SJ
    Al-Fayoumi, MA
    [J]. Proceedings of the IASTED International Conference on Computational Intelligence, 2005, : 359 - 362
  • [5] Two Efficient Digital Multisignature Schemes
    Chu, Hongwei
    Zhao, Yinliang
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, 2008, : 258 - 261
  • [6] A method for authenticating digital records for healthcare systems
    Anand, A.
    Singh, A. K.
    [J]. SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2022, 33
  • [7] Program Code Understandability and Authenticating Code Predicting Systems: A Metric-Based Approach
    Jha, Pooja
    Patnaik, K. Sridhar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 2, 2016, 396 : 95 - 103
  • [8] Digital signature/multisignature schemes giving public key verification and message recovery simultaneously
    Wu, TC
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (06): : 329 - 337
  • [9] ElGamal-like digital signature and multisignature schemes using self-certified public keys
    Chang, YS
    Wu, TC
    Huang, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 50 (02) : 99 - 105
  • [10] Return Code Schemes for Electronic Voting Systems
    Khazaei, Shahram
    Wikstrom, Douglas
    [J]. ELECTRONIC VOTING (E-VOTE-ID 2017), 2017, 10615 : 198 - 209