Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The security of two ID-based mutlisignature protocols for sequential and broadcasting architectures
Information Processing Letters
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Modified Maurer-Yacobi`s scheme and its applications
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Practical Digital Multisignature Scheme Based on Discrete Logarithms
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Online/Offline signatures and multisignatures for AODV and DSR routing security
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.48 |
The multisignatures achieve the purpose for many individuals to cooperatively sign the same document. However, for the sake of the division of labor, it might be required that each individual sign a partial group message that he is responsible for. These schemes are called multisignatures with distinguished signing authorities. Based on the difficulty of the factorization problem, we proposed two ID-based multisignature schemes with distinguished signing authorities. One scheme is suitable for the sequential architecture and the other for the broadcasting one.