Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

A digital multisignature scheme using bijective public-key cryptosystems

Published: 01 November 1988 Publication History

Abstract

A new digital multisignature scheme using bijective public-key cryptosystems that overcomes the problems of previous signature schemes used for multisignatures is proposed. The principal features of this scheme are (1) the length of a multisignature message is nearly equivalent to that for a singlesignature message; (2) by using a one-way hash function, multisignature generation and verification are processed in an efficient manner; (3) the order of signing is not restricted; and (4) this scheme can be constructed on any bijective public-key cryptosystem as well as the RSA scheme. In addition, it is shown that the new scheme is considered as safe as the public-key cryptosystem used in this new scheme. Some variations based on the scheme are also presented.

References

[1]
COPPERSMITH, D. Another birthday attack. In Proceedings of the CR YPTO '85, Lecture Notes in Computer Science, 218, Springer-Verlag, New York, 1985, 14-17.
[2]
DAVIES, D.W. Applying the RSA digital signature to electric mail. IEEE Computer (Feb. 1983), 55-62.
[3]
DENNING, D.E. Digital signatures with RSA and other public-key cryptosystem. Commun. ACM 27, 4 (Apr. 1984), 388-392.
[4]
DIFFIE, W., AND HELLMAN, M. New directions in cryptography. IEEE Trans. In{. Theor. IT- 22, 6 (Nov. 1976), 644-654.
[5]
GAREY, M. R., AND JOHNSON, D.S. Computers and Intractability--A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco, 1979.
[6]
ITAKURA, K., AND NAKAMURA, K. A public-key cryptosystem suitable for digital multisignatures. NEC J. Res. Dev. 71 (Oct. 1983).
[7]
LEIBERHERR, K. Uniform complexity and digital signatures. In Lecture Notes in Computer Science, 115, Springer-Verlag, New York, 1981, 530-543.
[8]
MATYAS, S.M. Digital signatures--an overview. Comput. Netw. 3, 2 (Apr. 1979), 87-94.
[9]
OKAMOTO, T., AND SHIRAISHI, A. A fast signature scheme based on quadratic inequalities. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr. 1985). IEEE, New York, 1985, 123-132.
[10]
RAVIN, M. O. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep. MIT/LCS/TR-212, MIT, Cambridge, Mass., 1979.
[11]
RIVEST, R. V., SHAMIR, A., AND ADLEMAN, L. A method for obtair/ing digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120-126.

Cited By

View all
  • (2023)A Lattice-Based Multisignature Scheme for Blockchain-Enabled SystemsEmerging Networking Architecture and Technologies10.1007/978-981-19-9697-9_27(336-346)Online publication date: 1-Feb-2023
  • (2023)Threshold and Multi-signature Schemes from Linear Hash FunctionsAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30589-4_22(628-658)Online publication date: 23-Apr-2023
  • (2022)Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM53663.2022.9721802(1-4)Online publication date: 3-Jan-2022
  • Show More Cited By

Index Terms

  1. A digital multisignature scheme using bijective public-key cryptosystems

    Recommendations

    Reviews

    James P. Anderson

    The problem of multiple signatures in electronic data systems originated in the paper world, where even routine and ordinary correspondence requires various forms of counter-signatures and approval signatures (for example, look at the title pages of most technical or engineering reports produced by large corporations). Electronic documents require such signatures to the same extent. From earlier work (cited in the paper) the author provides a general schema for multiple electronic signatures that increases the message length by the length of the ciphertext of each added signature. The author then describes and analyzes a scheme in which the length in bits of a multisigned document is increased only by the length of a single signature, plus one bit for each additional signatory. Previous schemes increased the total message length by the length of a single signature times the number of signatories. The paper includes an example of the process using the RSA algorithm; Okamoto claims, however, that any bijective ciphering scheme is equally applicable. Proofs of the security properties of the proposed scheme are also presented. This carefully written paper is an excellent model of what technical papers should be. I recommend it to everyone working in the field of office automation (for the application) as well as to those working in public key cryptology. It is a nice, well-written piece of work.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computer Systems
    ACM Transactions on Computer Systems  Volume 6, Issue 4
    Nov. 1988
    101 pages
    ISSN:0734-2071
    EISSN:1557-7333
    DOI:10.1145/48012
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1988
    Published in TOCS Volume 6, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)189
    • Downloads (Last 6 weeks)35
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Lattice-Based Multisignature Scheme for Blockchain-Enabled SystemsEmerging Networking Architecture and Technologies10.1007/978-981-19-9697-9_27(336-346)Online publication date: 1-Feb-2023
    • (2023)Threshold and Multi-signature Schemes from Linear Hash FunctionsAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30589-4_22(628-658)Online publication date: 23-Apr-2023
    • (2022)Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM53663.2022.9721802(1-4)Online publication date: 3-Jan-2022
    • (2022)Locally Verifiable Signature and Key AggregationAdvances in Cryptology – CRYPTO 202210.1007/978-3-031-15979-4_26(761-791)Online publication date: 15-Aug-2022
    • (2021)A New Schnorr Multi-Signatures to Support Both Multiple Messages Signing and Key AggregationJournal of Information Processing10.2197/ipsjjip.29.52529(525-536)Online publication date: 2021
    • (2021)A Privacy-Preserving Logistics Information System with TraceabilityCyberspace Safety and Security10.1007/978-3-030-94029-4_11(145-163)Online publication date: 9-Nov-2021
    • (2021)Two-Party Adaptor Signatures from Identification SchemesPublic-Key Cryptography – PKC 202110.1007/978-3-030-75245-3_17(451-480)Online publication date: 1-May-2021
    • (2020)Development of Design for Enhancing Trust in Cloud’s SPI StackInternational Journal of Computational and Experimental Science and Engineering10.22399/ijcesen.3708736:1(13-18)Online publication date: 31-Mar-2020
    • (2020)Sequential Quantum Multiparty Signature Based on Quantum Fourier Transform and Chaotic SystemIEEE Access10.1109/ACCESS.2020.29662558(13218-13227)Online publication date: 2020
    • (2020)A Novel Scheme of Schnorr Multi-signatures for Multiple Messages with Key AggregationAdvances on Broad-Band Wireless Computing, Communication and Applications10.1007/978-3-030-61108-8_28(284-295)Online publication date: 8-Oct-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media