Improvement Of A Structured Multi-Signature Scheme

被引:0
|
作者
Zhang, Jun [1 ]
机构
[1] ShaoXing Univ, Dept Comp Sci, Shao Xing 312000, Zhejiang, Peoples R China
来源
关键词
multi-signature; structured multi-signature; hash function; primitive-root; discrete logarithm problem (DLP);
D O I
10.4028/www.scientific.net/KEM.439-440.401
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Structured multi-signatures is a special multi-signature which multiple signer can sign the same message and it provided co-signers with different position have different authorization capability. There are lots of structured multi-signature schemes such as Ham's scheme and Burmester's scheme, etc. Though Ham's scheme was relatively safer, yet this scheme was not safety enough because it was very easily aggressed by the forgery attack. This paper shows the scheme can not resist the forgery attack. Then the paper proposed a new structure multi-signature scheme based on the difficulty of the discrete logarithm problem with verifying signature parameter and signers' public keys. By verifying public-key, the new scheme can resist lots of outsider attack and insider attack. The validity of the new scheme can be verified, and it is a secure structured multi-signature scheme.
引用
收藏
页码:401 / 406
页数:6
相关论文
共 50 条
  • [21] A New Proxy Multi-Signature Scheme
    Xiong, Jiang Guan
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 20 - 23
  • [22] SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Lu Rongbo He Dake Wang Changji(College of Mathematics and Computer Science
    Journal of Electronics(China), 2008, (03) : 372 - 377
  • [23] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528
  • [24] Security Analysis and The Improvement of the sequential multi-signature scheme based on discrete logarithm
    Zhang, Xinghua
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 581 - 584
  • [25] Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel
    Sun, Ying
    Xu, Chunxiang
    Xia, Qi
    Yu, Yong
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 661 - 664
  • [26] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [27] Nonrepudiable multi-proxy multi-signature scheme
    Xue, QS
    Cao, ZF
    SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 102 - 105
  • [28] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [29] A Controllable Quantum Sequential Multi-signature Scheme
    Ma Ying
    Tian Wei-Jian
    Fan Yang-Yu
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 40 - 45
  • [30] Efficient Multi-Signature Scheme Using Lattice
    Kansal, Meenakshi
    Singh, Amit Kumar
    Dutta, Ratna
    COMPUTER JOURNAL, 2022, 65 (09): : 2421 - 2429