Linear Lossy Identification Scheme derives Tightly-Secure Multisignature

Masayuki Fukumitsu, Shingo Hasegawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

For the multisignature schemes, the tight security in the plain public key model is considered as one of the desirable features. In this paper, we first give a generic construction of multisignature schemes which is tightly secure in the plain public key model. Our construction is based on the ID schemes which have two properties called the lossiness and the linearity. Moreover, we then find that the lossiness of most of the schemes is proven from the linearity. In this sense, we propose a new property of ID schemes and show that the combination of the linearity of ID schemes and the new property implies the lossiness. This result implies the relationship between these properties to shrink the conditions required for our generic construction.

Original languageEnglish
Title of host publicationProceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages24-31
Number of pages8
ISBN (Electronic)9781728199221
DOIs
Publication statusPublished - 2020 Aug
Event15th Annual Asia Joint Conference on Information Security, AsiaJCIS 2020 - Taipei, Taiwan, Province of China
Duration: 2020 Aug 202020 Aug 21

Publication series

NameProceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020

Conference

Conference15th Annual Asia Joint Conference on Information Security, AsiaJCIS 2020
CountryTaiwan, Province of China
CityTaipei
Period20/8/2020/8/21

Keywords

  • linear identification scheme
  • lossy identification scheme
  • multisignature
  • tight security

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Linear Lossy Identification Scheme derives Tightly-Secure Multisignature'. Together they form a unique fingerprint.

Cite this