An ID-based multi-signature scheme

被引:0
|
作者
Meng, Tao [1 ]
Zhang, Xinping [1 ]
Sun, Shenghe [1 ]
机构
[1] Harbin Inst Technol, Dept Automat Test & Control, Harbin 150080, Peoples R China
来源
2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an identity-based multi-signature scheme, including the signature protocol and the verification algorithm. Key feature of the proposed scheme is that, the length of the scheme has nothing to do with the number of signatories, and some calculations can be performed beforehand In addition the security of the scheme is discussed. By security analysis, the proposed signature scheme can effectively resist many kinds of attacks such as replay attack.
引用
收藏
页码:115 / 117
页数:3
相关论文
共 50 条
  • [21] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [22] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [23] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [24] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714
  • [25] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [27] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [28] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [29] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [30] A New ID-Based Threshold Group Signature Scheme
    Zhang, Zhiqiang
    Ye, Yunlong
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,