• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 92
Next 10 →

Cryptanalysis of Threshold-Multisignature Schemes

by Lifeng Guo , 2004
"... In [1], Li et al. proposed a new type of signature scheme, called the (t, n) thresholdmutisignature scheme. The first one needs a mutually trusted share distribution center (SDC) while the second one does not. In this paper, we present a security analysis on their second schemes. We point out that t ..."
Abstract - Add to MetaCart
that their second threshold-multisignature scheme is vulnerable to universal forgery by an insider attacker under reasonable assumptions. In our attack, (n t + 1) colluding members can control the group secret key. Therefore, they can generate valid threshold-multisignautre for any message without the help

New Digital Multisignature Scheme with Distinguished Signing Responsibilities

by Luu Hong Dung, Nguyen Hieu Minh, Hoang Quoc Viet Ha Noi , 2010
"... A multisignature scheme is a digital signature scheme that allows multiple signers to generate a single signature in a collaborative and simultaneous manner. In this paper we first review of the digital multisignature schemes using elliptic curvers and elliptic curve version of the multisignature sc ..."
Abstract - Add to MetaCart
A multisignature scheme is a digital signature scheme that allows multiple signers to generate a single signature in a collaborative and simultaneous manner. In this paper we first review of the digital multisignature schemes using elliptic curvers and elliptic curve version of the multisignature

Security of A Multisignature Scheme for Specified Group of Verifiers

by Jiqiang Lv, Xinmei Wang, Kwangjo Kim
"... Abstract. A multisignature scheme for specified group of verifiers needs a group of signers ’ cooperation to sign a message to a specified group of verifiers that must cooperate to check the signature’s validity later. Recently, Zhang et al. proposed a new multisignature scheme for specified group o ..."
Abstract - Add to MetaCart
Abstract. A multisignature scheme for specified group of verifiers needs a group of signers ’ cooperation to sign a message to a specified group of verifiers that must cooperate to check the signature’s validity later. Recently, Zhang et al. proposed a new multisignature scheme for specified group

Meta-Multisignature schemes based on the discrete logarithm problem

by Patrick Horster, Markus Michels, Holger Petersen , 1994
"... In this paper we present the first multisignature scheme giving message recovery based on the discrete logarithm problem. An efficient multisignature scheme with appendix has been proposed by Harn recently. We cryptanalyze this scheme, present two attacks and show how to countermeasure them. Furt ..."
Abstract - Cited by 13 (3 self) - Add to MetaCart
In this paper we present the first multisignature scheme giving message recovery based on the discrete logarithm problem. An efficient multisignature scheme with appendix has been proposed by Harn recently. We cryptanalyze this scheme, present two attacks and show how to countermeasure them

A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation

by Claude Castelluccia, Jihye Kim, Gene Tsudik
"... Abstract. A multicast communication source often needs to securely verify which multicast group members have received a message, but verification of individually signed acknowledgments from each member would impose a significant computation and communication cost. As pointed out by Nicolosi and Mazi ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
and Mazieres [NM04], such cost is minimized if the intermediate nodes along the multicast distribution tree aggregate the individual signatures generated by the multicast receivers into a single multisignature. While the solution of [NM04], based on a multisignature scheme of Boldyreva [Bol03], relied on so

Attribute Based Multisignature Scheme for Wireless Communications

by Ximeng Liu , Hui Zhu , Jianfeng Ma , Qi Li , Jinbo Xiong
"... With rapidly development of wireless communication, more mobile devices are used in our daily life. Although the need for accessing a wireless network is evident, new problems, such as keeping and preserving user identity's privacy, should be greatly concerned. Attribute based signature scheme ..."
Abstract - Add to MetaCart
signature to verify the message becomes less. In order to reduce the bandwidth needed to transmit attribute based signatures and keep signer's privacy, attribute based multisignature scheme (ABMS) was proposed in this paper. Moreover, we formalize and construct the ABMS. Our scheme is existentially

Digital multisignature schemes for authenticating delegates in mobile code systems

by Shiuh-pyng Shieh, Senior Member, Chern-tang Lin, Wei-bon Yang, Hung-min Sun - IEEE Transactions on Vehicular Technology , 2000
"... Abstract—In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Abstract—In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature

Multisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model

by Zuhua Shao , 2008
"... In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security requ ..."
Abstract - Add to MetaCart
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security

A New Digital Multisignature Scheme With Distinguished Signing Authorities

by Shin-jia Hwang, Min-shiang Hwang, Shiang-feng Tzeng
"... In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. In Harn’s scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing ..."
Abstract - Add to MetaCart
In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. In Harn’s scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing

Improvement of Laih and Yen’s multisignature scheme *

by Xie Qi 谢 琪, Yu Xiu-yuan (于秀源 , 2003
"... Abstract: A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme ..."
Abstract - Add to MetaCart
scheme which overcomes the security weakness of Laih and Yen’s scheme.
Next 10 →
Results 1 - 10 of 92
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University