Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders

  • Chuan-Ming Li
  • Tzonelih Hwang
  • Narn-Yih Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 950)


In this paper, we are going to combine the idea of the (t, n) threshold signature scheme with the multisignature scheme and propose a new type of signature scheme, called the (t, n) threshold-multisignature scheme. In the (t, n) threshold-multisignature scheme, at least t shareholders of a specific group have to cooperate to generate a valid group signature and suspected forgery implies traceability of adversarial shareholders. The validity of that signature for the specific group can be verified without knowing the membership of the signers to that group.


  1. 1.
    Y. Desmedt and Y. Frankel: ”Shared Generation of Authenticators and Signatures”, Advances in Cryptology — Crypto '91, Proceedings, pp.457–469, Springer Verlag, 1991.Google Scholar
  2. 2.
    L. Harn: ”(t,n) Threshold Signature and Digital Multisignature”, Workshop on Cryptography & Data Security, Proceedings, pp.61–73, June 7–9, Chung Cheng Institute of Technology, R.O.C., 1993.Google Scholar
  3. 3.
    A. Shamir: ”How to Share A Secret”, Commun. ACM, 22:612–613, 1979.MATHMathSciNetCrossRefGoogle Scholar
  4. 4.
    C. Li, T. Hwang and N. Lee: ”Remark on the Threshold RSA Signature Scheme”, Advances in Cryptology — Crypto '93, Proceedings, 1993.Google Scholar
  5. 5.
    K. Itakura and K. Nakamura: ”A Public-Key Cryptosystem Suitable for Digital Multisignatures”, NEC Research and Develop., 71, pp.1–8, 1983.Google Scholar
  6. 6.
    ”The Digital Signature Standard”, Commun. ACM, 35, No.7, pp.36–40, 1992.Google Scholar
  7. 7.
    S. M. Yen and C. S. Laih: ”New Digital Signature Scheme Based on Discrete Logarithm”, Electrionics Letters, Vol. 29, (12), pp.1120–1121, 1993.Google Scholar
  8. 8.
    T. Hardjono and Y. Zheng: ”A Practical Digital Multisignature Scheme Based on Discrete Logarithms”, Advances in Cryptology — AUSCRYPTO'92, pp. 16–21, 1992.Google Scholar
  9. 9.
    L. Harn and T. Kiesler: ”New Scheme for Digital Multisignatures”, Electronic Letters, Vol. 25, No. 15, pp. 1002–1003, 1989.Google Scholar
  10. 10.
    K. Ohta and T. Okamoto: ”A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme”, Advances in Cryptoloy — ASIACRYPT'91, pp. 75–79, 1991.Google Scholar
  11. 11.
    T. Okamoto: ”A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystem”, ACM Transactions on Computer Systems, Vol. 6, No. 8, pp. 432–441, 1988.MATHMathSciNetCrossRefGoogle Scholar
  12. 12.
    Y. Zheng, T. Matsumoto and H. Imai: ”Structural Properties of One — Way Hash Functions”, Advances in Cryptology — Crypto '90, Proceedings, pp. 285–302, Springer Verlag, 1990.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Chuan-Ming Li
    • 1
  • Tzonelih Hwang
    • 1
  • Narn-Yih Lee
    • 1
  1. 1.Institute of Information EngineeringNational Cheng-Kung UniversityTainanTaiwan, R.O.C.

Personalised recommendations