Keyword : multisignature scheme


Key Substitution Attacks on Multisignature Schemes
Bennian DOU Hong ZHANG Chun-Hua CHEN Chungen XU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 244-245
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key substitution attackmultisignature scheme
 Summary | Full Text:PDF

A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism
Naoto YANAI Eikoh CHIDA Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1346-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multisignature schemestructured multisignature schemehomomorphic schemenon-commutative ring homomorphismrandom oracle model
 Summary | Full Text:PDF

A Secure Multisignature Scheme with Signing Order Verifiability
Mitsuru TADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 73-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
multisignature schemesigning orderorder-specified multisignature schemeseries-parallel graphsecurity
 Summary | Full Text:PDF

A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
Shirow MITOMI Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10 ; pp. 2488-2499
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
multisignature schemeDLP-based signatureRSA signaturemessage recovery signature
 Summary | Full Text:PDF