Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A digital multisignature scheme using bijective public-key cryptosystems
ACM Transactions on Computer Systems (TOCS)
Identity-based conference key broadcast schemes with user authentication
Computers and Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Practical Digital Multisignature Scheme Based on Discrete Logarithms
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Digital multi-signature scheme based on the elliptic curve cryptosystem
Journal of Computer Science and Technology
Computer Standards & Interfaces
An ID-based Multi-signature Scheme
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 02
Identity Based Multisignatures
Informatica
Multi-signers Strong Designated Verifier Signature Scheme
SNPD '08 Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Attack on digital multi-signature scheme based on elliptic curve cryptosystem
Journal of Computer Science and Technology
An ID-based multisignature scheme without reblocking and predetermined signing order
Computer Standards & Interfaces
Further Remarks on Identity-Based RSA Multi-signature
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Efficient Certificateless Strong Designated Verifier Signature Scheme
CIS '09 Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 01
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The certificateless public key cryptography (CL-PKC) is a new paradigm of modern cryptography, which was proposed to simplify the certificate management problem of PKC and to avoid the key escrow problem of identity-based cryptosystem (IBC). In this paper, we proposed an efficient and secure certificateless strong designated verifier multisignature (CL-SDVMS) scheme using elliptic curve cryptography (ECC) and bilinear pairings. The proposed CL-SDVMS scheme allows a group of signers to generate a common signature on the same message intended to a designated verifier for verification. The length of the final multisignature is independent of the number of signers and identical to the length of the individual signatures, and the verification time of the multisignature is the same as the time needs to verify any individual signature generated by a signer. In addition, our multisignature scheme can be verified by a designated verifier only; however, he cannot claim to a third-party that the signature is computed by the signers or himself. The proposed scheme satisfies the properties of singer's privacy protection, strongness, non-transferability and source hiding of an SDVS scheme and is unforgeable against the adversaries of different capabilities. The proposed CL-SDVMS scheme is useful where a single document needs to be authenticated by a set of persons and applicable in various applications like decision making processes, petitions, workflow systems etc.