Skip to main content

On the Sequentiality of Three Optimal Structured Multisignature Schemes

  • Conference paper
Information Security Practice and Experience (ISPEC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4464))

Abstract

A structured multisignature scheme is an order-sensitive multisignature scheme that allows participating signers to sign the same messages in compliance with a specified signing order. In this paper, we find that three optimal structured multisignature schemes cannot keep sequentiality since they cannot prevent partial signers producing a valid partial multisignature in a signing order different from the specified one. Hence, verifies cannot identify the real signing order only by checking verification equations. We guess that it is impossible to design any optimal structured multisignature scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Research and Development 71, 1–8 (1983)

    Google Scholar 

  2. Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech. 141(5), 307–313 (1994)

    Article  MATH  Google Scholar 

  3. Okamoto, T., Ohta, K.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 139–148. Springer, Heidelberg (1993)

    Google Scholar 

  4. Leung, K.R.P.H., Hui, L.C.K.: Handling signature purposes in workflow systems. The Journal of System and Software 55, 245–259 (2001)

    Article  Google Scholar 

  5. Lin, C.-Y., Wu, T.-C., Hwang, J.-j.: ID-based structured Multisignature Schemes. In: Advances in Network and distributed Systems security. IFIP Conference Proceedings, vol. 206, pp. 45–59. Kluwer Academic Publishers, Boston (2001)

    Google Scholar 

  6. Mitchell, C.J., Hur, N.: On the security of a structural proven signer ordering multisignature scheme. In: Proceedings of the IFIP TC6/TC11 SixthJoint Working Conference on Communications and Multimedia Security (CMS). IFIP Conference Proceedings, vol. 228, pp. 1–8. Kluwer Academic Publishers, Boston (2002)

    Google Scholar 

  7. Mitomi, S., Miyaji, A.: A Mulitisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 298–312. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Tada, M.: An order-specified one-cycle multisignature scheme secure against active attack. In: Proceedings of computer security Symposium (CSS 2001), pp. 217–222 (2001)

    Google Scholar 

  9. Burmester, M., et al.: A Structured ElGamal-Type Multisignature Scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 466–482. Springer, Heidelberg (2000)

    Google Scholar 

  10. Wu, T.C., Hsu, C.L., Lin, C.Y.: On the security of Burmester et al. Structured ElGamal-Type Multisignature Scheme. In: Proceeding of 11th Conf. On National Security, Tianan, Taiwan, 3-4 May 2001, pp. 349–352 (2001)

    Google Scholar 

  11. Desmelt, Y.: Society and group oriented cryptography: A new concept, Advances in Cryptology. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)

    Google Scholar 

  12. Lin, C.-Y., Wu, T.-C., Zhang, F.: A structured multisignature scheme from the Gap Diffie-Hellman Group. eprint.iacr.org/2003/090 (2003)

    Google Scholar 

  13. Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Harn, L., Lin, C.-y., Wu, T.-C.: Structured multisignature algorithms. IEE Proc-comput. Digit. Tech. 151(3), 231–234 (2004)

    Article  Google Scholar 

  15. Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

  16. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  17. Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  18. Dong, Z., Chen, K.: An attack on a multisignature scheme. eprint.iacr.org/2003/201 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Duncan S. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Shao, Z. (2007). On the Sequentiality of Three Optimal Structured Multisignature Schemes. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72163-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72159-8

  • Online ISBN: 978-3-540-72163-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics