Abstract
In this paper we present the first multisignature scheme giving message recovery based on the discrete logarithm problem. An efficient multisignature scheme with appendix has been proposed by Harn recently. We cryptanalyze this scheme, present two attacks and show how to countermeasure them. Furthermore we adopt the Meta-ElGamal and Meta-Message recovery signature scheme with one and two message blocks to the slightly modified scheme and give conditions which variants can be used. We show that for the variants giving message recovery it is useful to apply the variants with two message blocks to prevent the described attacks and to guarantee the efficiency of the scheme.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. Chaum, “Untraceable electronic mail return addresses and digital pseudonyms”, Communcations of the ACM, Vol. 24 (2), Feb., (1981), pp. 84–88.
D. Chaum, J.-H. Everste, J.van de Graaf, “An improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations”, Lecture Notes in Computer Science 304, Advances in Cryptology: Proc. Eurocrypt’87, Berlin: Springer Verlag, (1988), pp. 127–143.
T. E1Gamal, “Cryptography and logarithms over finite fields”, Stanford University, CA., UMI Order No. DA 8420519, (1984), 119 pages.
T. EIGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July, (1985), pp. 469–472.
S. Goldwasser, S. Micali, R. Rivest, “A digital signature scheme secure against adaptive chosen message attacks”, SIAM Journal on Computing, Vol. 17, No. 2, (1988), pp. 281–308.
L. Harn, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature”, IEE Proc.-Comput. Digit. Tech., Vol. 141, No. 5, September, (1994), pp. 307–313.
L. Harn, “New digital signature scheme based on discrete logarithm”, Electronics Letters, Vol. 30, No. 5, (1994), pp. 396–398.
P. Horster, H. Petersen, “Generalized ElGamal-signatures” (in German), Sicherheit in Informationssystemen, Proceedings of SIS ‘84, Zürich, March 10–11, 1994, Verlag der Fachvereine Zürich, (1994), pp. 89–106.
P. Horster, M. Michels, H. Petersen, “Meta-ElGamal signature schemes”, Proc. of the 2nd ACM conference on Computation and Communication security, Fairfax, Virginia, Nov. 2–4, (1994), pp. 96–107.
P. Horster, M. Michels, H. Petersen, “Generalized signature schemes for one message block”, Proc. Workshop on IT-Security, Vienna, Sept. 22–23, (1994), 16 pages.
P. Horster, M. Michels, H. Petersen, “Meta signature schemes giving message recovery based on the discrete logarithm problem”, Proc. Workshop on IT-Security, Vienna, Sept. 22–23, (1994), 12 pages.
H.-J. Knobloch, “A remark on the size of ElGamal-type digital signatures”, EISS Report 1/94, University of Karlsruhe, (1994), 5 pages.
National Institute of Standards and Technology, Federal Information Process. Standard, PIPS Pub XX: Digital Signature Standard (DSS ), (1991).
K. Nyberg, R. Rueppel, “A new signature scheme based on the DSA giving message recovery”, Proc. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, Nov. 3–5., (1993), 4 pages.
K. Nyberg, R. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem”, Pre-proceedings of Eurocrypt ‘84, (1994), pp. 175–190.
C.P. Schnorr, “Efficient identification and signatures for smart cards”, Lecture Notes in Computer Science 435, Advances in Cryptology: Proc. Crypto ‘89, Berlin: Springer Verlag, (1990), pp. 239–251.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Horster, P., Michels, M., Petersen, H. (1995). Meta-Multisignature schemes based on the discrete logarithm problem. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive