Identity Based Multisignatures

作者: Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena

DOI: 10.15388/INFORMATICA.2006.131

关键词:

摘要: This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our scheme requires a forced verification at every level to avoid the overlooking of predecessors' signatures. However, in individual signatures is performed by designated clerk. We show that our are secure against existential forgery under adaptive chosen message attack random oracle model.

参考文章(17)
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena, A Survey on ID-Based Cryptographic Primitives. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 94- ,(2005)
K. Itakura, A public-key cryptosystem suitable for digital multisignatures Nec Research & Development. ,vol. 71, pp. 1- 8 ,(1983)
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing international conference on the theory and application of cryptology and information security. pp. 514- 532 ,(2001) , 10.1007/3-540-45682-1_30
Kazuo Ohta, Tatsuaki Okamoto, A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme international cryptology conference. pp. 139- 148 ,(1991) , 10.1007/3-540-57332-1_11
Tatsuaki Okamoto, A digital multisignature scheme using bijective public-key cryptosystems ACM Transactions on Computer Systems. ,vol. 6, pp. 432- 441 ,(1988) , 10.1145/48012.48246
L. Harn, Group-oriented (t, n) threshold digital signature scheme and digital multisignature IEE Proceedings - Computers and Digital Techniques. ,vol. 141, pp. 307- 313 ,(1994) , 10.1049/IP-CDT:19941293
Mihir Bellare, Phillip Rogaway, Random oracles are practical: a paradigm for designing efficient protocols computer and communications security. pp. 62- 73 ,(1993) , 10.1145/168588.168596
R. Gangishetti, M.C. Gorantla, M.L. Das, A. Saxena, V.P. Gulati, An efficient secure key issuing protocol in ID-based cryptosystems international conference on information technology coding and computing. ,vol. 1, pp. 674- 678 ,(2005) , 10.1109/ITCC.2005.75