Skip to main content

On the Exact Security of Multi-signature Schemes Based on RSA

  • Conference paper
  • First Online:
Book cover Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

Abstract

Up to present, we have yet seen no multi-signature schemes based on RSA secure against active attacks proposed. We have examined the possibility of simulation of signatures in the MM scheme [7] in order to investigate whether that scheme has the security against active attacks. The MM scheme cannot be shown secure against active attacks. We have constructed the RSA-based multi-signature scheme in order to overcome the problem that the MM scheme has. The proposed scheme provides the security against adaptive chosen message insider attack targeting one signer, and can keep tighter reduction rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare and P. Rogaway: “Random oracles are practical: A paradigm for designing efficient protocols”, Proceedings of the 1st Conference on Computer and Communications Security, 1993.

    Google Scholar 

  2. M. Bellare and P. Rogaway: “The Exact Security of Digital Signatures — How to Sign with RSA and Rabin”, Proceedings of Eurocrypt’96, LNCS vol.1070, pp.399–416, Springer-Verlag, 1996.

    Google Scholar 

  3. J.S. Coron: “On the Exact Security of Full Domain Hash”, Proceedings of Crypto’00, LNCS vol.1880, pp.229–235, Springer-Verlag, 2000.

    Google Scholar 

  4. J.S. Coron: “Optimal Security Proofs for PSS and Other Signature Schemes”, Proceedings of Eurocrypt’02, LNCS vol.2332, pp.272–287, Springer-Verlag, 2002.

    Google Scholar 

  5. H. Doi, M. Mambo and E. Okamoto: “RSA-based Multisignature Scheme for Various Group Structures”, Transactions of IPSJ, vol.41, no.08, pp.2080–2091, 2000.

    MathSciNet  Google Scholar 

  6. S. Micali, K. Ohta and L. Reyzin: “Accountable-Subgroup Multisignatures”, Proceedings of the Eighth ACM Conference on Computer and Communications Security’ 01, pp.245–254, 2001.

    Google Scholar 

  7. S. Mitomi and A. Miyaji: “A multisignature scheme with message flexibility, order flexibility and order verifiability”, Proceedings of ACISP’00, LNCS vol.1841, pp.298–312, Springer-Verlag, 2000.

    Google Scholar 

  8. T. Okamoto: “A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystems”, ACM Transactions on Computer Systems, vol.6, no.8, pp.432–441, 1988.

    Article  MathSciNet  Google Scholar 

  9. K. Ohta and T. Okamoto: “Multi-Signature Schemes Secure against Active Insider Attacks”, IEICE transactions of fundamentals, vol.E82-A, no.1, pp.22–31, 1999.

    Google Scholar 

  10. K. Ohta: Private communication, The lecture note in the class of cryptographic theory for undergraduate students at The University of Electro-Communications, 2002.

    Google Scholar 

  11. M. Tada: “An Order-Specified Multisignature Scheme Secure against Active Insider Attacks”, Proceedings of ACISP’02, LNCS vol.2384, pp.328–345, Springer-Verlag, 2002.

    Google Scholar 

  12. M. Tada: “Intended multisignature schemes and trivially constructed multisignature schemes”, Proceedings of The Computer Security Symposium 2002, IPSJ, pp.291–296, 2002.

    Google Scholar 

  13. V. Shoup: “OAEP Reconsidered”, Journal of Cryptology, vol.15 no.4, pp.223–249, Springer-Verlag, 2002.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kawauchi, K., Tada, M. (2003). On the Exact Security of Multi-signature Schemes Based on RSA. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics