Abstract
An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.
Similar content being viewed by others
References
D. Boneh, C. Gentry, et al. Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Eurocrypt’03, LNCS 2656, Berlin, Springer-Verlag, 2003, 416–432.
A. Boldyreva. Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. Public Key Cryptography-PKC’2003, LNCS 2567, Berlin, Springer-Verlag, 2003, 31–46.
K. Itakura, K. Nakamura. A public key cryptosystem suitable for digital multisignatures. NEC Research & Development, 71(1983), 1–8.
L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Computers and Digital Techniques, 141(1994)5, 307–313.
P. Horster, M. Michels, et al. Meta-multisignatures scheme based on the discrete logarithm problem. Proceedings of the Eleventh International Conference on Information Security, Chapman & Hall, 1995, 128–141.
T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. on Computer Systems, 6(1988)4, 432–441.
K. Ohta, T. Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. Advances in Asiacrypt’91, LNCS 739, Berlin, Springer-Verlag, 1991, 75–79.
K. Ohta, T. Okamoto. Multisignature scheme secure against active insider attacks. IEICE Trans. on Fundamentals of Electronics Communications and Computer Sciences, E82-A(1999)1, 21–31.
S. Micali, K. Ohta, et al. Accountable-subgroup multisignatures. Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS’2001), ACM, 2001, 245–254.
A. Shamir. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, LNCS 196, Berlin, Springer-Verlag, 1984, 47–53.
D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto’01, LNCS 2139, Berlin, Springer-Verlag, 2001, 213–229.
J. C. Cha, J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. Public Key Cryptography-PKC’2003, LNCS 2567, Berlin, Springer-Verlag, 2003, 18–30.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National 973 Project of China (No.G1999035803), the National Natural Science Foundation of China (No.60373104) and the National 863 Project of China (No.2002AA143021).
About this article
Cite this article
Cheng, X., Liu, J., Guo, L. et al. Identity-based multisignature and aggregate signature schemes from m-torsion groups. J. of Electron.(China) 23, 569–573 (2006). https://doi.org/10.1007/s11767-004-0178-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11767-004-0178-z