Advertisement

ID-based Structured Multisignature Schemes

  • Chih -Yin Lin
  • Tzong -Chen Wu
  • Jing-Jang Hwang
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 78)

Abstract

The signing structure of a multisignature scheme specifies the signing order for all signers when signing messages, and any multisignature not obeying the specified signing order will be verified as invalid. In accordance with the different responsibilities of the participant signers, the signing structure of a multisignature scheme could be further classified as the following three types: serial, parallel and mixed, where the mixed structure is regarded as the mix of the serial and the parallel. Based on the well-known ID-based public key system, we will propose three ID-based structured multisignature schemes and each scheme respectively realizes the serial, parallel and mixed signing structures. In the proposed schemes, the length of a multisignature is fixed and the verification of a multisignature is efficient, regardless of the number of signers involved. Besides, any invalid partial multisignature can be effectively identified during the generation of the multisignature.

Keywords

Multisignature structured multisignature ID-based public key signing structure 

References

  1. [1]
    L.M. Adleman and K.S. McCurley, “Open problems in number-theoretic complexity, II”, Proc. First Algorithmic Number Theory Symposium, Springer-Verlag, 1994, pp.291–322.Google Scholar
  2. [2]
    C. Boyd, “Digital Multisignatures”. IMA Conference on Cryptography and Coding, Oxford University Press, 1989, pp. 241–246.Google Scholar
  3. [3]
    C. Boyd, “Multisignatures based on Zero Knowledge Schemes”, Electronics Letters. 27(22), October 1991, pp. 2002–2004.CrossRefGoogle Scholar
  4. [4]
    M. Burmester, Y. Desmedt, H. Doi, M. Mambo, E. Okamoto, M. Tada and Y. Yoshifuji, “A structured EIGamal-type multisignature scheme”, Proc. Workshop on Practice and Theory in Public Key Cryptosystems, LCNS 1751, Springer-Verlag, 2000. pp. 466–483.Google Scholar
  5. [5]
    Y.S. Chang, T.C. Wu and S.C. Huang, “EIGamal-like digital signature and multisignature schemes using self-certified public keys”, The Journal of Systems and Software, 50(2). 2000, pp. 99–105.CrossRefGoogle Scholar
  6. [6]
    H. Doi, E. Okamoto and M. Mambo, “Multisignature schemes for various group structures”, The 36-th Annual Allerton Conference on Communication, Control, and Computing, 1999, pp. 713–722.Google Scholar
  7. [7]
    A. Fiat and A. Shamir, “How to prove yourself: practical solution to identification and signature problems”. Advances in Cryptology-CRYPTO’86, Springer-Verlag, 1987, pp. 186–194.Google Scholar
  8. [8]
    T. Hardjono and Y. Zheng, “A practical digital multisignature scheme based on discrete logarithms”. Advance in Cryptology-A USCRYPT’92, Springer-Verlag, 1993, pp. 122–132.Google Scholar
  9. [9]
    L. Ham and T. Kielser, “New scheme for digital multisignatures”, Electronics Letters, 25(15), 1989, pp. 1002–1003.CrossRefGoogle Scholar
  10. [10]
    K. ltakura and K. Nakamura, “A public-key cryptosystem suitable for digital multisignature”, NEC Research and Development, Vol. 71, October 1983, pp. 1–8.Google Scholar
  11. [11]
    M. Mambo, K. Usuda and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Tran. Fundamentals, E97-A(9), 1996, pp. 1338–1353.Google Scholar
  12. [12]
    M. Mambo, K. Usuda and E. Okamoto, “Proxy signatures for delegating signing operation”, Proc. Conf on Computer and Comm. Security, ACM press 1996, pp. 48–57.Google Scholar
  13. [13]
    K. Ohta, S. Micali and L. Reyzin, “Accountable-subgroup Multisignatures”, Manuscript, Massachusetts Institute of Technology, Cambridge, MA, USA, Nov. 2000.Google Scholar
  14. [14]
    K. Ohta and T. Okamoto, “A digital multisignature scheme based on the Fiat-Shamir Scheme”, Advance in Cryptology-ASIACRYPT’91, Springer-Verlag, 1993, pp. 139–148.Google Scholar
  15. [15]
    K. Ohta and T. Okamoto, “Multisignature schemes secure against active insider attacks”, IEICE Transactions on Fundamentals, E82-A(1), 1999, pp. 21–31.Google Scholar
  16. [16]
    T. Okamoto, “A digital multisignature scheme using bijective public-key cryptosystems”, ACM Tran. Computer Systems, 6(8), 1988, pp. 432–441.CrossRefMATHGoogle Scholar
  17. [17]
    R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Comm. of the ACM, 21(2), 1978, pp. 120–126.MathSciNetCrossRefMATHGoogle Scholar
  18. [18]
    A. Shamir, “Identity-based cryptosystems and signature schemes”, Advances in Cryprology-CRYPTO’84, Springer-Verlag, 1985, pp. 47–53.Google Scholar
  19. [19]
    T.C. Wu, S.L. Chou and T.S. Wu, “Two ID-based multisignature protocols for sequential and broadcasting architectures”, Computer Comm. 19(9–10). 1996, pp. 851–856.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2002

Authors and Affiliations

  • Chih -Yin Lin
    • 1
  • Tzong -Chen Wu
    • 1
    • 2
  • Jing-Jang Hwang
    • 1
  1. 1.Institute of Information ManagementNational Chiao Tung UniversityHsinchuTaiwan, Republic of China
  2. 2.Department of Information ManagementNational Taiwan University of Science and TechnologyTaipeiTaiwan, Republic of China

Personalised recommendations