An ID-based multi-signature scheme

被引:0
|
作者
Meng, Tao [1 ]
Zhang, Xinping [1 ]
Sun, Shenghe [1 ]
机构
[1] Harbin Inst Technol, Dept Automat Test & Control, Harbin 150080, Peoples R China
来源
2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an identity-based multi-signature scheme, including the signature protocol and the verification algorithm. Key feature of the proposed scheme is that, the length of the scheme has nothing to do with the number of signatories, and some calculations can be performed beforehand In addition the security of the scheme is discussed. By security analysis, the proposed signature scheme can effectively resist many kinds of attacks such as replay attack.
引用
收藏
页码:115 / 117
页数:3
相关论文
共 50 条
  • [31] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [32] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [33] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [34] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [35] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [36] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [37] ID-based signature scheme without trusted PKG
    Liao, J
    Xiao, JF
    Qi, YH
    Huang, PW
    Rong, MT
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
  • [38] Secure vehicular communications based on group signature and ID-based signature scheme
    Sun, Xiaoting
    Lin, Xiaodong
    Ho, Pin-Han
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
  • [39] An ID-based multi-signer universal designated multi-verifier signature scheme
    Chang, Ting-Yi
    INFORMATION AND COMPUTATION, 2011, 209 (07) : 1007 - 1015
  • [40] Isogeny-Based Multi-signature Scheme
    de Goyon, Mathieu
    Miyaji, Atsuko
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 477 - 491