Abstract
In many applications a document needs to be signed by more than one signer. When a signature depends on more than one signer we call it a multi-signature. Further, ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures were proposed to address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked. We propose to apply the concept of Forward-Security to multi-signatures. The basic signature scheme that we have considered is ElGamal Signature scheme which is based on discrete log problem. We initially make this signature scheme forward-secure and then apply it to multi-signatures. By this all signers of the document can guarantee the security of document signed in the past even if their secret key is exposed today. An adversary will not be able to forge a multi-signature unless the secret key of all the signers are compromised in the same time period, which is practically not possible. Further, we propose two types of Forward-Secure multi-signatures : Forward-Secure Parallel multi-signatures and Forward-Secure Serial multi-signatures.
Once a user switches to use forward-secure signatures in place of ordinary signatures, he can easily extend it to use it as a multi-signature. In all applications where parallel or serial multi-signatures are used, the corresponding forward-secure multi-signatures can be used.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Delfs, H., Knebl, H.: Introduction to Cryptography - Principles and Applications. Springer, Heidelberg (2002)
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
ElGamal, T.: A Public Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE transactions on Information Theory IT-31(4) (1985)
Anderson, R.: Invited Lecture. In: Fourth Annual Conference on Computer and Communications Security. ACM, New York (1997)
Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 431. Springer, Heidelberg (1999)
Kang, B.G., Park, J.H., Hahn, S.G.: A New Forward Secure Signature Scheme, http://eprint.iacr.org/2004/183/
Itkis, G., Xie, P.: Generalized key-evolving signature schemes or how to foil an armed adversary. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 151–168. Springer, Heidelberg (2003)
Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 116–129. Springer, Heidelberg (2000)
Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)
Kozlov, A., Reyzin, L.: Forward-secure signatures with fast key update. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 241–256. Springer, Heidelberg (2003)
Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS 2000), pp. 108–115. ACM, New York (2000)
Malkin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 400–417. Springer, Heidelberg (2002)
Boyd, C.: Digital Multi-signatures. In: Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)
Itakura, K., Nakamura, K.: A public key cryptosystem suitable for digital multi-signatures. NEC Research and Development 71, 1–8 (1983)
Micali, S., Ohta, K., Reyzin, L.: Accountable Subgroup Multi-signatures. In: ACM Conference on Computer and Communications Security, pp. 245–254 (2001)
Shieh, S.-P., Lin, C.-T., Yang, W.-B., Sun, H.-M.: Digital Multi-signature schemes for Authenticating Delegates in Mobile Code Systems. IEEE transactions on Vehicular Tech. 49(4) (July 2000)
Damgard, I.: Collision-free hash functions and public key signature schemes. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 203–216. Springer, Heidelberg (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sunitha, N.R., Amberker, B.B. (2008). Forward-Secure Multi-signatures. In: Parashar, M., Aggarwal, S.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2008. Lecture Notes in Computer Science, vol 5375. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89737-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-89737-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89736-1
Online ISBN: 978-3-540-89737-8
eBook Packages: Computer ScienceComputer Science (R0)