Abstract
A structured multisignature scheme is an order-sensitive multisignature scheme that allows participating signers to sign the same messages in compliance with a specified signing order. In this paper, we find that three optimal structured multisignature schemes cannot keep sequentiality since they cannot prevent partial signers producing a valid partial multisignature in a signing order different from the specified one. Hence, verifies cannot identify the real signing order only by checking verification equations. We guess that it is impossible to design any optimal structured multisignature scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research and Development 71, 1–8 (1983)
Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech. 141(5), 307–313 (1994)
Okamoto, T., Ohta, K.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 139–148. Springer, Heidelberg (1993)
Leung, K.R.P.H., Hui, L.C.K.: Handling signature purposes in workflow systems. The Journal of System and Software 55, 245–259 (2001)
Lin, C.-Y., Wu, T.-C., Hwang, J.-j.: ID-based structured Multisignature Schemes. In: Advances in Network and distributed Systems security. IFIP Conference Proceedings, vol. 206, pp. 45–59. Kluwer Academic Publishers, Boston (2001)
Mitchell, C.J., Hur, N.: On the security of a structural proven signer ordering multisignature scheme. In: Proceedings of the IFIP TC6/TC11 SixthJoint Working Conference on Communications and Multimedia Security (CMS). IFIP Conference Proceedings, vol. 228, pp. 1–8. Kluwer Academic Publishers, Boston (2002)
Mitomi, S., Miyaji, A.: A Mulitisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 298–312. Springer, Heidelberg (2000)
Tada, M.: An order-specified one-cycle multisignature scheme secure against active attack. In: Proceedings of computer security Symposium (CSS 2001), pp. 217–222 (2001)
Burmester, M., et al.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 466–482. Springer, Heidelberg (2000)
Wu, T.C., Hsu, C.L., Lin, C.Y.: On the security of Burmester et al. Structured ElGamal-Type Multisignature Scheme. In: Proceeding of 11th Conf. On National Security, Tianan, Taiwan, 3-4 May 2001, pp. 349–352 (2001)
Desmelt, Y.: Society and group oriented cryptography: A new concept, Advances in Cryptology. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
Lin, C.-Y., Wu, T.-C., Zhang, F.: A structured multisignature scheme from the Gap Diffie-Hellman Group. eprint.iacr.org/2003/090 (2003)
Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Harn, L., Lin, C.-y., Wu, T.-C.: Structured multisignature algorithms. IEE Proc-comput. Digit. Tech. 151(3), 231–234 (2004)
Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. ACM 21(2), 120–126 (1978)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)
Dong, Z., Chen, K.: An attack on a multisignature scheme. eprint.iacr.org/2003/201 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Shao, Z. (2007). On the Sequentiality of Three Optimal Structured Multisignature Schemes. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)