Improvement Of A Structured Multi-Signature Scheme

被引:0
|
作者
Zhang, Jun [1 ]
机构
[1] ShaoXing Univ, Dept Comp Sci, Shao Xing 312000, Zhejiang, Peoples R China
来源
关键词
multi-signature; structured multi-signature; hash function; primitive-root; discrete logarithm problem (DLP);
D O I
10.4028/www.scientific.net/KEM.439-440.401
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Structured multi-signatures is a special multi-signature which multiple signer can sign the same message and it provided co-signers with different position have different authorization capability. There are lots of structured multi-signature schemes such as Ham's scheme and Burmester's scheme, etc. Though Ham's scheme was relatively safer, yet this scheme was not safety enough because it was very easily aggressed by the forgery attack. This paper shows the scheme can not resist the forgery attack. Then the paper proposed a new structure multi-signature scheme based on the difficulty of the discrete logarithm problem with verifying signature parameter and signers' public keys. By verifying public-key, the new scheme can resist lots of outsider attack and insider attack. The validity of the new scheme can be verified, and it is a secure structured multi-signature scheme.
引用
收藏
页码:401 / 406
页数:6
相关论文
共 50 条
  • [1] Structured multi-signature scheme with signers' intentions
    Department of Computer Science, Huaiyin Teachers College, Huaian 223001, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 5 (823-826):
  • [2] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [3] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [4] Analysis and Improvement of Proxy Blind Multi-Signature Scheme
    Tang, Pengzhi
    Chen, Renqun
    FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 144 - 154
  • [5] A E-cash scheme base on structured multi-signature
    Zhang Yinghui
    Rao Yunbo
    Zhou mingtian
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 98 - 102
  • [6] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [7] Improvement of a Multi-proxy Multi-signature Scheme in the Standard Model
    Fan, Haiwei
    Zhao, Xiangmo
    Ming, Yang
    Du, Jin
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4737 - 4742
  • [8] Improvement of identity-based proxy multi-signature scheme
    Shao, Zuhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) : 794 - 800
  • [9] Improvement of a proxy multi-signature scheme without random oracles
    Sun, Ying
    Xu, Chunxiang
    Yu, Yong
    Yang, Bo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 257 - 263
  • [10] A Combination Multi-Signature Scheme
    Jun, Zhang
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 16 - 19