Non-interactive CDH-based multisignature scheme in the plain public key model with tighter security

Yuan Zhou, Haifeng Qian*, Xiangxue Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

A multisignature scheme allows an ad hoc set of users to sign a message so that the resulting single signature certifies that the users endorsed the message. However, all known multisignatures are either at the price of complexity and additional trust of Certificate Authority (CA), or sacrificing efficiency of computation and communication (including both bandwidth and round). This paper proposes a new multisignature scheme with efficient verification in the plain public key model. Our multisignatures enjoys the most desired features: (1) Our plain public key model-based multisignatures do not impose any impractical key setup or PKI requirements; (2) Our multisignature scheme is non-interactive, which saves computation and communication in signature generation; (3) Through pre-computation, our scheme achieves verification in the plain public key model; (4) Provable tighter security under the standard CDH assumption ensures high level of security in both practice and theory. Hence, our non-interactive multisignatures are of great use in authentication of routes in networks.

Original languageEnglish
Title of host publicationInformation Security - 14th International Conference, ISC 2011, Proceedings
Pages341-354
Number of pages14
DOIs
StatePublished - 2011
Event14th International Conference on Information Security, ISC 2011 - Xi'an, China
Duration: 26 Oct 201129 Oct 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7001 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Information Security, ISC 2011
Country/TerritoryChina
CityXi'an
Period26/10/1129/10/11

Fingerprint

Dive into the research topics of 'Non-interactive CDH-based multisignature scheme in the plain public key model with tighter security'. Together they form a unique fingerprint.

Cite this