Skip to main content
Log in

Identity-based multisignature and aggregate signature schemes from m-torsion groups

  • Published:
Journal of Electronics (China)

Abstract

An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. Boneh, C. Gentry, et al. Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Eurocrypt’03, LNCS 2656, Berlin, Springer-Verlag, 2003, 416–432.

    Google Scholar 

  2. A. Boldyreva. Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. Public Key Cryptography-PKC’2003, LNCS 2567, Berlin, Springer-Verlag, 2003, 31–46.

    Google Scholar 

  3. K. Itakura, K. Nakamura. A public key cryptosystem suitable for digital multisignatures. NEC Research & Development, 71(1983), 1–8.

    Google Scholar 

  4. L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Computers and Digital Techniques, 141(1994)5, 307–313.

    Article  MATH  Google Scholar 

  5. P. Horster, M. Michels, et al. Meta-multisignatures scheme based on the discrete logarithm problem. Proceedings of the Eleventh International Conference on Information Security, Chapman & Hall, 1995, 128–141.

  6. T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. on Computer Systems, 6(1988)4, 432–441.

    Article  MATH  Google Scholar 

  7. K. Ohta, T. Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. Advances in Asiacrypt’91, LNCS 739, Berlin, Springer-Verlag, 1991, 75–79.

    Google Scholar 

  8. K. Ohta, T. Okamoto. Multisignature scheme secure against active insider attacks. IEICE Trans. on Fundamentals of Electronics Communications and Computer Sciences, E82-A(1999)1, 21–31.

    Google Scholar 

  9. S. Micali, K. Ohta, et al. Accountable-subgroup multisignatures. Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS’2001), ACM, 2001, 245–254.

  10. A. Shamir. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, LNCS 196, Berlin, Springer-Verlag, 1984, 47–53.

    Chapter  Google Scholar 

  11. D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto’01, LNCS 2139, Berlin, Springer-Verlag, 2001, 213–229.

    MATH  Google Scholar 

  12. J. C. Cha, J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. Public Key Cryptography-PKC’2003, LNCS 2567, Berlin, Springer-Verlag, 2003, 18–30.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Xiangguo.

Additional information

Supported by the National 973 Project of China (No.G1999035803), the National Natural Science Foundation of China (No.60373104) and the National 863 Project of China (No.2002AA143021).

About this article

Cite this article

Cheng, X., Liu, J., Guo, L. et al. Identity-based multisignature and aggregate signature schemes from m-torsion groups. J. of Electron.(China) 23, 569–573 (2006). https://doi.org/10.1007/s11767-004-0178-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-004-0178-z

Key words

Navigation