Results 1 - 10
of
92
Cryptanalysis of Threshold-Multisignature Schemes
, 2004
"... In [1], Li et al. proposed a new type of signature scheme, called the (t, n) thresholdmutisignature scheme. The first one needs a mutually trusted share distribution center (SDC) while the second one does not. In this paper, we present a security analysis on their second schemes. We point out that t ..."
Abstract
- Add to MetaCart
that their second threshold-multisignature scheme is vulnerable to universal forgery by an insider attacker under reasonable assumptions. In our attack, (n t + 1) colluding members can control the group secret key. Therefore, they can generate valid threshold-multisignautre for any message without the help
New Digital Multisignature Scheme with Distinguished Signing Responsibilities
, 2010
"... A multisignature scheme is a digital signature scheme that allows multiple signers to generate a single signature in a collaborative and simultaneous manner. In this paper we first review of the digital multisignature schemes using elliptic curvers and elliptic curve version of the multisignature sc ..."
Abstract
- Add to MetaCart
A multisignature scheme is a digital signature scheme that allows multiple signers to generate a single signature in a collaborative and simultaneous manner. In this paper we first review of the digital multisignature schemes using elliptic curvers and elliptic curve version of the multisignature
Security of A Multisignature Scheme for Specified Group of Verifiers
"... Abstract. A multisignature scheme for specified group of verifiers needs a group of signers ’ cooperation to sign a message to a specified group of verifiers that must cooperate to check the signature’s validity later. Recently, Zhang et al. proposed a new multisignature scheme for specified group o ..."
Abstract
- Add to MetaCart
Abstract. A multisignature scheme for specified group of verifiers needs a group of signers ’ cooperation to sign a message to a specified group of verifiers that must cooperate to check the signature’s validity later. Recently, Zhang et al. proposed a new multisignature scheme for specified group
Meta-Multisignature schemes based on the discrete logarithm problem
, 1994
"... In this paper we present the first multisignature scheme giving message recovery based on the discrete logarithm problem. An efficient multisignature scheme with appendix has been proposed by Harn recently. We cryptanalyze this scheme, present two attacks and show how to countermeasure them. Furt ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
In this paper we present the first multisignature scheme giving message recovery based on the discrete logarithm problem. An efficient multisignature scheme with appendix has been proposed by Harn recently. We cryptanalyze this scheme, present two attacks and show how to countermeasure them
A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation
"... Abstract. A multicast communication source often needs to securely verify which multicast group members have received a message, but verification of individually signed acknowledgments from each member would impose a significant computation and communication cost. As pointed out by Nicolosi and Mazi ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
and Mazieres [NM04], such cost is minimized if the intermediate nodes along the multicast distribution tree aggregate the individual signatures generated by the multicast receivers into a single multisignature. While the solution of [NM04], based on a multisignature scheme of Boldyreva [Bol03], relied on so
Attribute Based Multisignature Scheme for Wireless Communications
"... With rapidly development of wireless communication, more mobile devices are used in our daily life. Although the need for accessing a wireless network is evident, new problems, such as keeping and preserving user identity's privacy, should be greatly concerned. Attribute based signature scheme ..."
Abstract
- Add to MetaCart
signature to verify the message becomes less. In order to reduce the bandwidth needed to transmit attribute based signatures and keep signer's privacy, attribute based multisignature scheme (ABMS) was proposed in this paper. Moreover, we formalize and construct the ABMS. Our scheme is existentially
Digital multisignature schemes for authenticating delegates in mobile code systems
- IEEE Transactions on Vehicular Technology
, 2000
"... Abstract—In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
Abstract—In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature
Multisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model
, 2008
"... In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security requ ..."
Abstract
- Add to MetaCart
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security
A New Digital Multisignature Scheme With Distinguished Signing Authorities
"... In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. In Harn’s scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing ..."
Abstract
- Add to MetaCart
In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. In Harn’s scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing
Improvement of Laih and Yen’s multisignature scheme *
, 2003
"... Abstract: A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme ..."
Results 1 - 10
of
92