43
Views
5
CrossRef citations to date
0
Altmetric
Articles

An efficient and secure identity based multiple signatures scheme based on RSA

&
Pages 953-971 | Received 01 Jun 2018, Published online: 17 Nov 2019

References

  • Shamir, Adi, “Identity-based cryptosystems and signature schemes”, In Crypto, vol. 84, pp. 47-53. 1984.
  • Goldwasser, Shafi, Silvio Micali, and Ronald L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks”, SIAM Journal on Computing, vol. 17(2), pp. 281-308, 1988. doi: 10.1137/0217017
  • C. P. Schnorr, “Efficient signature generation for smart cards,” Journal of Cryptology, Vol. 4, pp. 161-174, 1991. doi: 10.1007/BF00196725
  • Zheng, Yuliang, “Digital Signcryption or how to achieve cost (Signature & encryption) cost (signature) + cost (encryption)”, Advances in Cryptology—Crypto’97’, Springer Berlin Heidelberg, pp 165-179, 1997. doi: 10.1007/BFb0052234
  • Micali, Silvio, Kazuo Ohta, and Leonid Reyzin, “Accountable-subgroup multisignatures”, Proceedings of the 8th ACM conference on Computer and Communications Security, ACM, pp. 245-254, 2001.
  • Lee, Byoungcheon, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, and Seungjae Yoo, “Secure key issuing in ID-based cryptography”, Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, Australian Computer Society, Inc., vol. 32, pp. 69-74, 2004.
  • Youngblood, Carl, “An Introduction to Identity-Based Cryptography”, CSEP 590TU, pp. 1-7, 2005.
  • Gangishetti, Raju, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, and Ved Prakash Gulati, “An efficient secure key issuing protocol in ID-based cryptosystems”, Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference, IEEE, vol. 1, pp. 674-678, 2005.
  • Gangishetti, Raju, M. Choudary Gorantla, Manik Lal Das, and Ashutosh Saxena, “Identity based multisignatures”, Informatica , vol.17(2), pp. 177-186, 2006.
  • Bellare, Mihir, Alexandra Boldyreva, and Jessica Staddon, “Randomness Re-use in Multi-Recipient Encryption Schemeas”, International Workshop on Public Key Cryptography. Springer Berlin, Heidelberg, vol. 2567, pp. 85-99, 2003.
  • Harn, Lein, and Jian Ren, “Efficient identity-based RSA multisignatures”, computers & security, vol. 27(1), pp. 12-15, 2008. doi: 10.1016/j.cose.2008.03.003
  • Joux, Antoine, “Introduction to identity-based cryptography”, Cryptology and Information Security Series-Identity-Based Cryptography, ebooks.iospress.nl, vol. 2, pp.1 – 12, 2009.
  • Tan, Zuowen, “An improved identity-based group signature scheme”, Computational Intelligence and Security, 2009, CIS’09. International Conference on. Vol. 1. IEEE, 2009.
  • Domıguez Francisco Javier Buenasmananas and Encinas Luis Hernandez, “Digital identity-based multisignature scheme implementation”, INFOCOMP: The First International Conference on Advanced Communications and Computation, pp 42-45, 2011.
  • R. Duran Diaz, F. Hernandez Alvarez, L. Hernandez Encinas and A. Queiruga Dios, “A review of multisignatures based on RSA”, DIGI-TAL.CSIC, pp. 1-7, 2010.
  • Yang, Fuw-Yi, Jeng-Hung Lo, and Cai-Ming Liao, “Improving an efficient ID-based RSA multisignature”, Journal of Ambient Intelligence and Humanized Computing, vol.4 (2), pp.249-254, 2013. doi: 10.1007/s12652-011-0093-8
  • Yang, Bo Long, and Hao Guo, “A Hierarchical Identity-Based Signature Scheme”, Applied Mechanics and Materials, Trans Tech Publications, vol. 696, pp. 173-176, 2015. doi: 10.4028/www.scientific.net/AMM.696.173
  • Swapna, G., and P. Vasudeva Reddy, “Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 17(2), pp. 181-190, 2014. doi: 10.1080/09720529.2013.867674
  • Jain, Vijay, Ranjan Kumar, and Zia Saquib. “An Approach towards Digital Signatures for e-Governance in India.” Proceedings of the 2015 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia, ACM , pp. 82-88, 2015.
  • UIDAI. UID FAQ: Aadhaar Features, Eligibility. Available at: https://resident.uidai.net.in/faqs, 2015.
  • UIDAI, Lost EID/UID Process. Available at: https://uidai.gov.in/ images/mou/eiduid_process_ver5_2_27052013.pdf
  • Baek, Joonsang, Reihaneh Safavi-Naini, and Willy Susilo, “Efficient multi-receiver identity-based encryption and its application to broad-cast encryption”, International Workshop on Public Key Cryptography, Springer Berlin Heidelberg, pp 380-397, 2005.
  • Cheng, Y.D., He, J.D. and Hu, F.G., 2017, Quantitative risk analysis method of information security-Combining fuzzy comprehensive analysis with information entropy, Journal of Discrete Mathematical Sciences and Cryptography, vol. 20(1), pp.149-165, 2017. doi: 10.1080/09720529.2016.1178913

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.