ISPEC 2007: Information Security Practice and Experience pp 105-115 | Cite as
On the Sequentiality of Three Optimal Structured Multisignature Schemes
Abstract
A structured multisignature scheme is an order-sensitive multisignature scheme that allows participating signers to sign the same messages in compliance with a specified signing order. In this paper, we find that three optimal structured multisignature schemes cannot keep sequentiality since they cannot prevent partial signers producing a valid partial multisignature in a signing order different from the specified one. Hence, verifies cannot identify the real signing order only by checking verification equations. We guess that it is impossible to design any optimal structured multisignature scheme.
Keywords
Cryptanalysis structured multisignature sequentiality order forge attackPreview
Unable to display preview. Download preview PDF.
References
- 1.Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research and Development 71, 1–8 (1983)Google Scholar
- 2.Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech. 141(5), 307–313 (1994)MATHCrossRefGoogle Scholar
- 3.Okamoto, T., Ohta, K.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 139–148. Springer, Heidelberg (1993)Google Scholar
- 4.Leung, K.R.P.H., Hui, L.C.K.: Handling signature purposes in workflow systems. The Journal of System and Software 55, 245–259 (2001)CrossRefGoogle Scholar
- 5.Lin, C.-Y., Wu, T.-C., Hwang, J.-j.: ID-based structured Multisignature Schemes. In: Advances in Network and distributed Systems security. IFIP Conference Proceedings, vol. 206, pp. 45–59. Kluwer Academic Publishers, Boston (2001)Google Scholar
- 6.Mitchell, C.J., Hur, N.: On the security of a structural proven signer ordering multisignature scheme. In: Proceedings of the IFIP TC6/TC11 SixthJoint Working Conference on Communications and Multimedia Security (CMS). IFIP Conference Proceedings, vol. 228, pp. 1–8. Kluwer Academic Publishers, Boston (2002)Google Scholar
- 7.Mitomi, S., Miyaji, A.: A Mulitisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 298–312. Springer, Heidelberg (2000)CrossRefGoogle Scholar
- 8.Tada, M.: An order-specified one-cycle multisignature scheme secure against active attack. In: Proceedings of computer security Symposium (CSS 2001), pp. 217–222 (2001)Google Scholar
- 9.Burmester, M., et al.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 466–482. Springer, Heidelberg (2000)Google Scholar
- 10.Wu, T.C., Hsu, C.L., Lin, C.Y.: On the security of Burmester et al. Structured ElGamal-Type Multisignature Scheme. In: Proceeding of 11th Conf. On National Security, Tianan, Taiwan, 3-4 May 2001, pp. 349–352 (2001)Google Scholar
- 11.Desmelt, Y.: Society and group oriented cryptography: A new concept, Advances in Cryptology. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)Google Scholar
- 12.Lin, C.-Y., Wu, T.-C., Zhang, F.: A structured multisignature scheme from the Gap Diffie-Hellman Group. eprint.iacr.org/2003/090 (2003)Google Scholar
- 13.Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 14.Harn, L., Lin, C.-y., Wu, T.-C.: Structured multisignature algorithms. IEE Proc-comput. Digit. Tech. 151(3), 231–234 (2004)CrossRefGoogle Scholar
- 15.Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. ACM 21(2), 120–126 (1978)MATHCrossRefGoogle Scholar
- 16.ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)MATHCrossRefMathSciNetGoogle Scholar
- 17.Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)MATHCrossRefMathSciNetGoogle Scholar
- 18.Dong, Z., Chen, K.: An attack on a multisignature scheme. eprint.iacr.org/2003/201 (2003)Google Scholar