An ID-based multi-signature scheme

被引:0
|
作者
Meng, Tao [1 ]
Zhang, Xinping [1 ]
Sun, Shenghe [1 ]
机构
[1] Harbin Inst Technol, Dept Automat Test & Control, Harbin 150080, Peoples R China
来源
2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an identity-based multi-signature scheme, including the signature protocol and the verification algorithm. Key feature of the proposed scheme is that, the length of the scheme has nothing to do with the number of signatories, and some calculations can be performed beforehand In addition the security of the scheme is discussed. By security analysis, the proposed signature scheme can effectively resist many kinds of attacks such as replay attack.
引用
收藏
页码:115 / 117
页数:3
相关论文
共 50 条
  • [41] An ID-based verifiable encrypted signature scheme based on Hess's scheme
    Gu, CX
    Zhu, YF
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 42 - 52
  • [42] Efficient ID-based Key-insulated Multi Signature Scheme without Pairings
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [43] A multi-signature scheme based on coding theory
    Meziani, Mohammed
    Cayrel, Pierre -L.
    World Academy of Science, Engineering and Technology, 2010, 63 : 244 - 250
  • [44] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    JournalofElectronics(China), 2008, (02) : 226 - 231
  • [45] A novel ID-based signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 551 - 555
  • [46] ID-based ring signature scheme for collaborative design system
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Zhang, Ya-Ling
    Zhang, Xiang
    Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2007, 36 (03): : 343 - 346
  • [47] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 33 - 36
  • [48] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [49] A Security Enforcement ID-based Partially Blind Signature Scheme
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Xu, Jian-Ping
    Wang, Yong
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 488 - 492
  • [50] Efficient ID-Based Signature Scheme from Bilinear Map
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306