Skip to main content
Log in

Secure order-specified multisignature scheme based on DSA

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature. Most order-specified multisignatures specified the orders as linear ones. In this paper, we proposed an order-specified multisignature scheme based on DSA secure against active insider attack. To our knowledge, it is the first order-specified multisignature shceme based on DSA signature scheme, in which signers can sign in flexible order represented by series-parallel graphs. In the multisignature scheme verification to both signers and signing order are available. The security of the scheme is proved by reduce to an identification scheme that is proved have some concrete security. The running time of verifying a signature is comparable to previous schemes while the running time of multisignature generation and the space needed is less than those schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Saito T. A Multiple Signature Scheme Enabling a Specified Signer's Order[C]//The 1997 Symposium on Cryptography and Information Security. Fukuoka, Jan, 29–Feb, 1, 1997.

  2. Shimbo A. Multisignature Schemes Based on the ElGamal Scheme [C]//The 1994 Symposium on Cryptography and Information Security. Biwako, January 27–29, 1994.

  3. Itakura K, Nakamura K. A Public-Key Cryptosystem Suitable for Digital Multisignatures [J].NEC J Res Dev, 1983,71: 1–8.

    Google Scholar 

  4. Okamoto T. A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystems [J].ACM Trans on Computer Systems, 1988,6(8): 432–441.

    Article  MathSciNet  Google Scholar 

  5. Ohta K, Okamoto T. Multi-Signature Schemes Secure against Active Insider Attacks [J].IEICE Transactions of Fundamentals, 1999,82-A(1): 22–31.

    Google Scholar 

  6. Mitomi S, Miyaji A. A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability [C]//Proceedings of ACISP 2000 (LNCS 1841). Berlin: Springer-Verlag, 2000: 298–312.

    Google Scholar 

  7. Tada M. An Order-Specified Multisignature Scheme Secure against Active Insider Attacks [C]//ACISP 2002 (LNCS 2384). Berlin, Springer-Verlag, 2002: 328–345.

    Google Scholar 

  8. Burmester M, Desmedt Y, Doi H,et al. A Structured El-Gamal-Type Multisignature Scheme [C]//Proceedings of PKC 2000 (LNCS 1751). Berlin: Springer-Verlag, 2000: 466–483.

    Google Scholar 

  9. Doi H, Mambo M, Okamoto E. On the Security of the RSA-Based Multisignature Scheme for Various Group Structure [C]//Proceedings of ACISP 2000 (LNCS 1841). Berlin: Springer-Verlag, 2000: 352–367.

    Google Scholar 

  10. Bellare M, Rogaway P. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols[C]//Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS). Fairfax, Virginia, November 3–5, 1993: 62–73.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Fan.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60403027)

Biography: YANG Muxiang (1976-), male, Ph. D. candidate, research direction: secret sharing, digital signature.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Muxiang, Y., Li, S., Jun, L. et al. Secure order-specified multisignature scheme based on DSA. Wuhan Univ. J. Nat. Sci. 11, 1613–1616 (2006). https://doi.org/10.1007/BF02831833

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831833

Key words

CLC number

Navigation