Digital identity-based multisignature scheme implementation

نویسندگان

  • Ascensión Hernández Encinas
  • Araceli Queiruga Dios
  • Luis Hernández Encinas
چکیده

Digital signature, as an official signature, have many applications in information security, including authentication, data integrity, and non-repudiation. When a private or public document must be signed by a group of people, we call it multisignature scheme if all and every single member of the group signs the document. An identity-based digital multisignature is a multi signer digital signature so that the multiple private keys are generated by a trusted third part from signer’s identities. In this paper, an efficient Java implementation to a recent identity-based multisignature scheme based on RSA is proposed. Keywords-RSA; digital signature; multi-signature scheme; Java.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Based Multisignature with Message Recovery

We present a new notion of short identity-based multisignature scheme with message recovery. We propose a concrete identity-based multisignature with message recovery scheme based on bilinear pairing in which multiple signers can generate a constant size multisignature on same message regardless of the number of signers. There is no requirement to transmit the original message to the verifier, ...

متن کامل

Identity Based Multisignatures

This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at every level to avoid the overlooking of the predecessors’ signatures. However, in parallel multisignature scheme the verification of individual signatures is performed by a designated clerk. We show that our schemes are secure ...

متن کامل

A Java Implementation of a Multisignature Scheme

Multisignature protocols are digital signature schemes that allow a group of users to sign a message so that the signature thus produced is valid only if all the members of the group participate in the signature process. In general, these schemes need the collaboration of a Trusted Third Party, which computes and securely stores some of the parameters associated to the scheme. In this work, we ...

متن کامل

An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identitybased multi-proxy signature, proxy multi-signature and multi-proxy mult...

متن کامل

Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems

In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature scheme, two digital multisignature schemes are proposed: the parallel multisignature scheme and the serial...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011