Icons / Logo / Facebook Created with Sketch. Icons / Logo / Google Created with Sketch. Icons / Logo / ORCID Created with Sketch. Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!

An improved multi-signature scheme for specified group of verifiers

Published on Jan 1, 2017in International Journal of Electronic Security and Digital Forensics
· DOI :10.1504/IJESDF.2017.10004414
Manoj Kumar Chande1
Estimated H-index: 1
,
Te Yu Chen1
Estimated H-index: 1
,
Cheng-Chi Lee27
Estimated H-index: 27
Cite
Abstract
Zhang and Xiao presented a multi-signature scheme for a specified group of verifiers and showed that forging their signature is mathematically equivalent to forge Harn's signature. However, Zhang and Xiao's scheme is not secure against the rogue-key attack. In this paper, we show how to mount a rogue-key attack on Zhang and Xiao's scheme and propose an improved multi-signature scheme for a specified group of verifiers. Our new scheme not only inherits the advantages of Zhang and Xiao's scheme, but also resists to known attacks including the rogue-key attack.
  • References (19)
  • Citations (0)
Cite
References19
Newest
Published on Apr 1, 2013in Information Sciences 5.52
Min-Shiang Hwang41
Estimated H-index: 41
(Asia University (Japan)),
Cheng-Chi Lee27
Estimated H-index: 27
(FJU: Fu Jen Catholic University),
Shiang-Feng Tzeng12
Estimated H-index: 12
(CYUT: Chaoyang University of Technology)
In this article, we shall propose a ((t"1, n"1), (t"2, n"2)) proxy signature scheme with (t"3, n"3) shared verification based on the RSA problem. In this scheme, any t"1 original signers can delegate the signing capability to the proxy group. After that, any t"2 proxy signers can sign a message on behalf of the original group for a specified verifier group. Only any t"3 verifiers together can check the validity of the proxy signature from the proxy group. The proposed scheme satisfies all proxy ...
Haibo Tian9
Estimated H-index: 9
A Strong Multiple Designated Verifiers Signature (SMDVS) enables a signer to convince a set of verifiers by generating one signature, of which the verification needs the private key of a verifier. After a brief survey of the current SMDVS schemes and attacks, we found that there were reported or applicable attacks on many schemes, and some schemes needed group communications in the signature verification algorithm. We propose a new SMDVS scheme which is secure against current attacks and needs n...
Published on Nov 1, 2011in International Journal of Information Security 1.82
Qiong Huang16
Estimated H-index: 16
(CityU: City University of Hong Kong),
Guomin Yang22
Estimated H-index: 22
(NUS: National University of Singapore)
+ 1 AuthorsWilly Susilo46
Estimated H-index: 46
(UOW: University of Wollongong)
Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signature is generated by the signer without letting the verifier transfer the conviction to others, while the public can still tell that the signature must be generated by one of them. Strong DVS (SDVS) strengthens the latter part by restricting the public from telling whether the signature is generated by one of them or by someone else. In this paper, we propose two new SDVS schemes. Compared with exis...
Published on Apr 1, 2010in Journal of Zhejiang University Science C
Jia-Lun Tsai10
Estimated H-index: 10
(NTUST: National Taiwan University of Science and Technology),
Tzong-Chen Wu21
Estimated H-index: 21
(NTUST: National Taiwan University of Science and Technology),
Kuo-Yu Tsai4
Estimated H-index: 4
(NTUST: National Taiwan University of Science and Technology)
The digital signature is a very important subject for network security. Considering multiple signers and multiple verifiers, Xie and Yu (2004) pointed out that the multisignature scheme of Laih and Yen (1996) is vulnerable to a harmful attack. An attack can occur when a specified group of verifiers cooperate to forge a multisignature by secret key substitution following the leak of a secret key or by group public key adjustment during the process of renewing membership. Xie and Yu proposed an im...
Published on Jul 1, 2008in Information Processing Letters 0.91
Kyung-Ah Shim13
Estimated H-index: 13
(Ewha Womans University)
In 1996, Jakobsson, Sako, and Impagliazzo and, on the other hand, Chaum introduced the notion of designated verifier signatures to solve some of the intrinsic problems of undeniable signatures. The generalization of this concept was formally investigated by Laguillaumie and Vergnaud as multi-designated verifiers signatures. Recently, Laguillaumie and Vergnaud proposed the first multi-designated verifiers signature scheme which protects the anonymity of signers without encryption. In this paper, ...
Bo Yang3
Estimated H-index: 3
(Beijing University of Posts and Telecommunications),
Zibi Xiao1
Estimated H-index: 1
(WUST: Wuhan University of Science and Technology)
+ 2 AuthorsXinxin Niu1
Estimated H-index: 1
(Beijing University of Posts and Telecommunications)
Based on Chameleon Hash and D. Boneh’s one round multi-party key agreement protocol, this paper proposes a multi-designated verifiers signature scheme. In this scheme only the verifiers designated by the signer can independently verify the signature. And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value. The analysis of the proposed scheme shows that it satisfies non-transferability, unforgeability and...
Published on Apr 20, 2007in Information Processing Letters 0.91
Fabien Laguillaumie17
Estimated H-index: 17
(UNICAEN: University of Caen Lower Normandy),
Damien Vergnaud24
Estimated H-index: 24
(CIT: Center for Information Technology)
In 1996, Jakobsson, Sako, and Impagliazzo and, on the other hand, Chaum proposed the notion of designated verifier signature to solve some of the intrinsic problems of undeniable signatures. The generalization of this concept, suggested by Desmedt at Crypto'03's rump session, was formally investigated by Laguillaumie and Vergnaud at ICICS'04 as multi-designated verifiers signatures. The protection of the signer's privacy, as defined in that paper, seems difficult to achieve, and the protocols th...
Published on Nov 1, 2005in Applied Mathematics and Computation 3.09
Eun-Jun Yoon21
Estimated H-index: 21
(KNU: Kyungpook National University),
Kee-Young Yoo26
Estimated H-index: 26
(KNU: Kyungpook National University)
Abstract Recently, Zhang-Xiao proposed a new multisignature scheme for specified group of verifiers. However, Zhang-Xiao’s scheme is still susceptible to forgery attack. Accordingly, the current paper demonstrates the vulnerability of Zhang-Xiao’s scheme to fogery attack that an attacker can forge the multisignature for any message.
Published on Jul 1, 2005in Applied Mathematics and Computation 3.09
Jiqiang Lv3
Estimated H-index: 3
(Xidian University),
Xinmei Wang3
Estimated H-index: 3
(Xidian University),
Kwangjo Kim31
Estimated H-index: 31
(ICU: Information and Communications University)
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to sign a message to a specified group of verifiers that must cooperate to check the signature’s validity later. Recently, Zhang et al. proposed a new multisignature scheme for specified group of verifiers. However, we find that Zhang et al.’s scheme cannot prevent a dishonest clerk of signing group from changing the signing message to another message of his choice while he is cooperating with the sign...
Published on Jan 1, 2005
Ching Yu Ng6
Estimated H-index: 6
(UOW: University of Wollongong),
Willy Susilo46
Estimated H-index: 46
(UOW: University of Wollongong),
Yi Mu36
Estimated H-index: 36
(UOW: University of Wollongong)
The notion of universal designated-verifier signatures was put forth by Steinfeld et. al. in Asiacrypt 2003. This notion allows a signature holder to designate the signature to a desired designated-verifier. In this paper, we extend this notion to allow a signature holder to designate the signature to multi verifiers, and hence, we call our scheme as universal designated multi verifier signatures. We provide security proofs for our schemes based on the random oracle model
Cited By0
Newest