Multisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model

被引:0
|
作者
Shao, Zuhua [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Hangzhou, Zhejiang, Peoples R China
来源
关键词
discrete logarithm; random oracle model; group oriented cryptography; multisignature;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security requirement on the generation of the signers' public keys. Adversaries are not required to reveal private keys corresponding to the public keys of its choice to the challenger in attack games. Thus the new multisignature scheme does not suffer from the problem identified by Micali et al., which is shared by many current multisignature schemes. Moreover, if the joint public key of a group of signers in this multisignature scheme is precomputed, the proposed multisignature scheme is optimal.
引用
收藏
页码:509 / 515
页数:7
相关论文
共 50 条
  • [1] Multisignature scheme based on discrete logarithms in the plain public key model
    Shao, Zuhua
    [J]. Informatica (Ljubljana), 2010, 34 (04) : 509 - 515
  • [2] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [3] Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security
    Zhou, Yuan
    Qian, Haifeng
    Li, Xiangxue
    [J]. INFORMATION SECURITY, 2011, 7001 : 341 - 354
  • [4] A new key authentication scheme based on discrete logarithms
    Lee, CC
    Hwang, MS
    Li, LH
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 139 (2-3) : 343 - 349
  • [5] Cryptanalysis of a key authentication scheme based on discrete logarithms
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    Kim, WH
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 72 - 76
  • [6] Key authentication scheme for cryptosystems based on discrete logarithms
    Horng, G
    Yang, CS
    [J]. COMPUTER COMMUNICATIONS, 1996, 19 (9-10) : 848 - 850
  • [7] Secure Key Authentication Scheme Based on Discrete Logarithms
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 73 - +
  • [8] Efficient discrete logarithm based multi-signature scheme in the plain public key model
    Ma, Changshe
    Weng, Jian
    Li, Yingjiu
    Deng, Robert
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (02) : 121 - 133
  • [9] Efficient discrete logarithm based multi-signature scheme in the plain public key model
    Changshe Ma
    Jian Weng
    Yingjiu Li
    Robert Deng
    [J]. Designs, Codes and Cryptography, 2010, 54 : 121 - 133
  • [10] A new key authentication scheme for cryptosystems based on discrete logarithms
    Shao, ZH
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 143 - 152