Forward-secure multisignature and blind signature schemes

Forward-secure signature schemes address the key exposure problem, in which all previously generated signatures are still considered to be valid even after the secret key is compromised. Multisignature scheme allow any subgroup of a group of users to jointly sign a document such that a verifier is convinced that each member of the subgroup participated in signing. Such schemes are very important technologies in this highly group-oriented society. Blind signature scheme are protocols for obtaining a signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients obtain afterward. Such schemes are very important technologies in privacy oriented e-commerce applications. In this paper, we propose a forward-secure multisignature scheme and a forward-secure blind signature scheme. Our constructions are based on the recently proposed forward-secure signature scheme by bilinear pairings.

[1]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[2]  K. Ohta,et al.  Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security) , 1999 .

[3]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[4]  Siu-Ming Yiu,et al.  Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.

[5]  Jacques Stern,et al.  Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.

[6]  Gene Itkis,et al.  Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.

[7]  Alexandra Boldyreva,et al.  Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .

[8]  David Chaum,et al.  Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.

[9]  Jung Hee Cheon,et al.  A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption , 2003, ICICS.

[10]  Fei Hu,et al.  A New Forward Secure Signature Scheme using Bilinear Maps , 2003, IACR Cryptol. ePrint Arch..

[11]  Silvio Micali,et al.  Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.

[12]  Kaoru Kurosawa,et al.  Oblivious keyword search , 2004, J. Complex..

[13]  Chin-Laung Lei,et al.  A Secure and Practical Electronic Voting Scheme for Real World Environments , 1997 .

[14]  Siu-Ming Yiu,et al.  Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.

[15]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[16]  Je Hong Park,et al.  A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..

[17]  S. Micali,et al.  Accountable-Subgroup Multisignatures , 2001 .

[18]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[19]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[20]  Lihua Liu,et al.  Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al , 2004, IACR Cryptol. ePrint Arch..

[21]  Claus-Peter Schnorr,et al.  Security of Blind Discrete Log Signatures against Interactive Attacks , 2001, ICICS.

[22]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.

[23]  Leonid Reyzin,et al.  Forward-Secure Signatures with Fast Key Update , 2002, SCN.

[24]  K. Itakura,et al.  A public-key cryptosystem suitable for digital multisignatures , 1983 .

[25]  Ross J. Anderson,et al.  Two remarks on public key cryptology , 2002 .

[26]  Alexandra Boldyreva,et al.  Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .

[27]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[28]  M. Michels,et al.  Hidden signature schemes based on the discrete logarithm problem and related concepts , 1995 .

[29]  Chanathip Namprempre,et al.  Forward-Secure Threshold Signature Schemes , 2001, CT-RSA.