Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
Computer Standards & Interfaces
Online/Offline signatures and multisignatures for AODV and DSR routing security
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An improved discrete logarithm-based multisignature scheme
Security and Communication Networks
Hi-index | 0.00 |
A novel multisignature scheme based on identity information is presented. Our scheme adopts user's identity information, such as name, address, social security number and others, as users' public key instead of random integers. Identity-based schemes are attractive because multisignatures can be verified using the signers' identity information, thus can help simplify the public key certifcation process. Our scheme overcomes the moduli clashes problem and does not require the signing order to be predetermined.