A CDH-Based multi-signature scheme with tight security reduction

Zecheng Wang*, Haifeng Qian, Taozhi Si, Zhibin Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

An efficient multi-signature scheme secure in the random oracle model is proposed, which is the first multi-signature scheme with tight security reduction to the hardness of computational Diffie-Hellman (CDH) problem. The scheme only needs the proof-of-possession (POP) key registration assumption to prevent the notorious rogue key attacks and obtain existentially unforgeable security against the adoptively chosen message and signing group attack. Given current state of the art, it is as difficult to solve the CDH problem as it is to solve the DL problem in many groups of cryptographic interest. Thus the scheme with tight security reduction offers substantially better efficiency (for a given level of provable security) than other schemes in the discrete logarithm setting. Moreover, both the size of multi-signature and the computational cost of verification do not increase with the number of actual signers increasing. Therefore, the proposed scheme is efficient and can be conveniently implemented in the current public key infrastructure (PKI) environment.

Original languageEnglish
Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
PublisherIEEE Computer Society
Pages2096-2101
Number of pages6
ISBN (Print)9780769533988
DOIs
StatePublished - 2008
Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
Duration: 18 Nov 200821 Nov 2008

Publication series

NameProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

Conference

Conference9th International Conference for Young Computer Scientists, ICYCS 2008
Country/TerritoryChina
CityZhang Jia Jie, Hunan
Period18/11/0821/11/08

Keywords

  • Digital signature
  • Multi-signature
  • Proof of possession
  • Random oracle model
  • Tight security reduction

Fingerprint

Dive into the research topics of 'A CDH-Based multi-signature scheme with tight security reduction'. Together they form a unique fingerprint.

Cite this