ElGamal-like digital signature and multisignature schemes using self-certified public keys

被引:20
作者
Chang, YS [1 ]
Wu, TC [1 ]
Huang, SC [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
关键词
digital signature; multisignature; self-certified public key; factorization; discrete logarithm; active attack;
D O I
10.1016/S0164-1212(99)00080-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we first present a digital signature scheme using self-certified public key. Subsequently, we present a digital multisignature scheme extended from the proposed digital signature. Both the proposed schemes have the advantage that the authentication of the public key can be accomplished with the verification of the signature or multisignature. The security of both the proposed schemes is based on the one-way hash function, the factorization and the discrete logarithm assumptions. Moreover, the proposed multisignature scheme preserves the main merits inherent in most of the previously developed schemes. We also demonstrate that the proposed multisignature scheme can withstand the active attack that some malicious impostors try to universally forge an individual signature or a multisignature for a given message that is rejected to be signed by the other co-signers. (C) 2000 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 15 条
[1]  
BETH T, 1998, ADV CRYPTOLOGY, P77
[2]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[3]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[4]  
GIRAULT M, 1991, ADV CRYPTOLOGY EUROC, P491
[5]   NEW DIGITAL SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM [J].
HARN, L .
ELECTRONICS LETTERS, 1994, 30 (05) :396-398
[6]   GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05) :307-313
[7]  
*INT ORG STAND, 1993, 97983 ISOIEC
[8]  
Li C.-M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P194, DOI 10.1007/BFb0053435
[9]  
MICHAUD S, 1996, REV HIST LIT FR, V96, P334
[10]  
RIVEST RL, 1978, CACM, V21, P2