Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital multisignature scheme using bijective public-key cryptosystems
ACM Transactions on Computer Systems (TOCS)
Identity-based conference key broadcast schemes with user authentication
Computers and Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Practical Digital Multisignature Scheme Based on Discrete Logarithms
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
Applied Mathematics and Computation
Group-oriented signature scheme with distinguished signing authorities
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
Hi-index | 0.24 |
Based on the difficulty of factorization problem, two ID-based digital multisignature protocols are proposed, one suitable for the sequential architecture and the other for the broadcasting architecture. Both protocols have common characteristics: (1) the size of multisignature is fixed, despite the number of participants increasing; (2) it is easy to implement the multisignature generation and verification procedures; (3) the key management among participants is simplified. As for the sequential multisignature protocol, it additionally has the following characteristics: (4) the signing order (if necessary) can be flexibly defined by the system or the document issuer in advance, without affecting the predefined setup parameters; (5) each signer can easily verify the partial multisignature produced by all preceding signers; also, each signer can check whether all preceding signers have indeed signed the document.