ACC 2011: Advances in Computing and Communications pp 534-540 | Cite as
Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature
Conference paper
Abstract
In 2008, Harn and Ren proposed an efficient identity-based RSA multisignatures scheme which it based on Shamir’s identity-based signature. In 2010, Yang et al. pointed out two methods that he presumed make the Harn-Ren scheme insecure. This documentation will prove that Yang et al.s first forgery attack was incorrect and the Harn-Ren scheme is still secure.
Keywords
Multisignature Identity-based signature RSA CryptosystemPreview
Unable to display preview. Download preview PDF.
References
- 1.Harn, L., Ren, J.: Efficient identity-based RSA multisignatures. Computers & Security 27(1-2), 12–15 (2008)CrossRefGoogle Scholar
- 2.Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: extended abstract. In: CCS 2001: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 245–254. ACM, New York (2001)Google Scholar
- 3.Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
- 4.Yang, F.Y., Lo, J.H., Liao, C.M.: Improvement of an efficient ID-based RSA multisignature. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), February 15-18, pp. 822–826 (2010)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2011