Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Uniform Complexity and Digital Signatures
Proceedings of the 8th Colloquium on Automata, Languages and Programming
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Provably Unforgeable Signatures
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Homage Group Authentication Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Group-oriented signature scheme with distinguished signing authorities
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
An improvement of delegated multisignature scheme with document decomposition
ACM SIGOPS Operating Systems Review
Proxy re-signatures: new definitions, algorithms, and applications
Proceedings of the 12th ACM conference on Computer and communications security
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Identity Based Multisignatures
Informatica
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
On the efficiency of group signatures providing information-theoretic anonymity
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Secure feedback service in wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
On the exact security of multi-signature schemes based on RSA
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Reliable food traceability using RFID tagging
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Non-interactive multisignatures in the plain public-key model with efficient verification
Information Processing Letters
Remote data checking using provable data possession
ACM Transactions on Information and System Security (TISSEC)
A multisignature scheme based on the SDLP and on the IFP
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
How to aggregate the CL signature scheme
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Formal security model of multisignatures
ISC'06 Proceedings of the 9th international conference on Information Security
ID-Based series-parallel multisignature schemes for multi-messages from bilinear maps
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An improved discrete logarithm-based multisignature scheme
Security and Communication Networks
Hi-index | 0.00 |
A new digital multisignature scheme using bijective public-key cryptosystems that overcomes the problems of previous signature schemes used for multisignatures is proposed. The principal features of this scheme are (1) the length of a multisignature message is nearly equivalent to that for a singlesignature message; (2) by using a one-way hash function, multisignature generation and verification are processed in an efficient manner; (3) the order of signing is not restricted; and (4) this scheme can be constructed on any bijective public-key cryptosystem as well as the RSA scheme. In addition, it is shown that the new scheme is considered as safe as the public-key cryptosystem used in this new scheme. Some variations based on the scheme are also presented.