Web csysec.blogspot.com

Monday, February 26, 2007

Bibliography on Group-Oriented Signatures

1983

  • K. Itakura, and K. Nakamura. A public key cryptosystem suitable for digital multisignatures. NEC Research & Development, 71:1-8, 1983.

1986

  • C. Boyd. Digital multisignatures. Cryptography and Coding, 1986.

1987

  • Y. Desmedt. Society and group oriented cryptography: a new concept. In: Crypto'87, LNCS 293, pp.120-127. Springer-Verlag, 1988.

1988

  • T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432-441.

1989

  • C. Boyd. Digital multisignatures. In: Cryptography and Coding, pp. 241-246. Oxford University Press, 1989.

  • Y. Desmedt, and Y. Frankel. Threshold cryptosystems. In: Crypto'89, LNCS 435, pp. 307-315. Springer-Verlag, 1990.

  • L. Harn and T. Kresler. New scheme for digital multisignatures. Electronics Letters, July 1989, 25(15):
    1002-1003.

1990

  • T. Kiesler and L. Harn. RSA blocking and multisignature schemes with no bit expansion. Electronics Letters, Aug 1990, 26(18): 1490-1491.

1991

  • C. Boyd. Multisignatures based on zero knowledge schemes. Electronics Letters, Oct 1991, 27(22): 2002-2004.

  • Y. Desmedt, and Y. Frankel. Shared generation of authenticators and signatures. Crypto 91, 1991.

  • T. Ohata, and T. Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Asiacrypt'91, LNCS 739, pp. 75-79. Springer-Verlag, 1991.

  • T.P. Pedersen. A threshold cryptosystem without a trusted party. In: Eurocrpt'91, LNCS 547, pp. 522-526. Berlin: Springer-Verlag, 1991.

1992

  • A. Fujioka, T. Okamoto, and K. Ohta. A practical digital multisignature scheme based on discrete logarithms. In: Auscrypt'92, LNCS 718, pp. 244-251. Springer-Verlag, 1992.

  • L. Harn, and S. Yang. Group-oriented undeniable signature schemes without the assistance of a mutually trusted party. In: Auscrypt'92, LNCS 718, pp.133-142. Springer-Verlag, 1993.

1994

  • Y. Desmedt. Threshold cryptography. European Transactions on Telecommunications, 5(4), 1994.

  • L. Harn. Group-oriented (t, n) threshold digital signature scheme and multisignature. IEE Proceedings - Computers and Digital Techniques, 1994, 141(5): 307-313.

  • L. Harn and Y. Xu. Design of generalised ElGamal type digital signature schemes based on discrete logarithm. Electronics Letters, Nov 1994, 30(24): 2025 -2026.

  • L. Harn. New digital signature scheme based on discrete logarithm. Electronics Letters, Mar 1994, 30(5): 396-398.

  • C-M. Li, T. Hwang and N-Y. Lee. Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Eurocrypt'94, LNCS 950, pp. 194-204. Springer-Verlag, 1995.

1995

  • P. Horster, M. Michels, and H. Petersen. Meta-multisignature schemes based on the discrete logarithm problem. In: Proc. of IFIP/SEC'95, pp. 128-141. Chapman & Hall, 1995.

  • P. Horster, M. Michels, and H. Peterson. Blind Multisignature Scheme Based on the Discrete Logarithm Problem. In: Proc. of 12th Annual Computer Security Applications Conference (ACSAC'95), 1996.

  • C. G. Kang. New digital multisignature scheme in electronic contract systems. In: Proc. of 1995 IEEE International Symposium on Information Theory, pp. 486. IEEE, 1995.

1996

  • R.Gennaro, S. Jarecki, H.Krawczyk, and T. Rabin. Robust threshold DSS signatures. In: Eurocrypt'96, LNCS 1070, pp. 354-371. Springer-Verlag, 1996. A modified version appeared in Information and Computation, 164(1): 54-84, 2001.

  • S.K. Langford. Weaknesses in some threshold cryptosystems. In: Crypto'96, LNCS 1109, pp.74-82. Springer-Verlag, 1996.

  • M. Michels, and P. Horster. On the risk of discruption in several multiparty signature schemes. In: Asiacrypt'96, LNCS 1163, pp.334-345. Springer-Verlag, 1996.

  • C. Park, and K. Kurosawa. New Elgamal type threshold digital signature scheme. IEICE Trans. Fundamentals, January 1996, E79-A(1): 86-93.

1997

  • C.-H. Wang, and T. Hwang. Threshold and Generalized DSS Signatures Without a Trusted Party. In: Proceeding of the 13th Annual Computer Security Applications Conference (ACSAC'97), pp. 221-226. IEEE Computer Society, 1997.

  • H. Petersen, and M. Michels. On signatures schemes with threshold verification detecting malicious verifiers. In: Workshop on Security Protocols'97, LNCS 1361, pp.67-78. Berlin: Springer-Verlag, 1997.

  • S. Russell. Multisignature algorithms for ISO 9796. ACM SIGSAC Security Audit & Control Review, January 1997, 15(1): 11-14.

1998

  • T. Rabin. A simplified approach to threshold and proactive RSA. In: Crypto 98, LNCS1462, pp. . 1998.

1999

  • R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Adaptive security for threshold cryptosystems. In Crypto'99, LNCS 1666, pp. 98-115. Berlin: Springer-Verlag, 1999.

  • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In: Eurocrypt'99, LNCS 1592, pp. 295-310. Berlin: Springer-Verlag, 1999.

  • L. Harn. Digital multisignature with distinguished signing authorities. Electronics Letters, Feb 1999, 35(4): 294-295.

  • K. Ohta and T. Okamoto. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E82-A(1): 21-31, 1999.

  • H.-M. Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, May 1999, 22(8): 717-722.

2000

  • Y.-S. Chang, T.-C. Wu and S.-C. Huang. ElGamal-like digital signature and multisignature schemes using self-certified public keys. Journal of Systems and Software, February 2000, 50(2): 99-105.

  • H. Doi, M. Mambo, and E. Okamoto. On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. In: Information Security and Privacy (ACISP'00), LNCS 1841, pp. 352-367. Springer-Verlag, 2000.

  • B. King. Algorithms to Speed Up Computations in Threshold RSA. In: Information Security and Privacy (ACISP'00), LNCS 1841, pp. 2443-456. Springer-Verlag, 2000.

  • B. King. Improved Methods to Perform Threshold RSA. In: ASIACRYPT 2000, LNCS 1976, pp. 359-372. Springer-Verlag, 2000.

  • C-M. Li, T. Hwang, N-Y. Lee, and J-J.Tsai. (t, n) threshold-multisignature schemes and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders. Cryptologia, July 2000, 24(3): 250-268.

  • Z.C Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, and H.W. Chan. Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities [comment]. Electronics Letters, Feb 2000, 36(4): 314-315.

  • J. Merkle. Multi-round passive attacks on server-aided RSA protocols. In: Proc. of the 7th ACM Conference on Computer and Communications Security (CCS 2000), pp. 102 - 107. ACM, 2000.

  • S. Mitomi and A. Miyaji. A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. In: Information Security and Privacy (ACISP'00), LNCS 1841, pp. 298-312. Springer-Verlag, 2000.

  • S.-P. Shieh, C.-T. Lin; W.-B. Yang, and H.-M. Sun. Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, Jul 2000, 49(4): 1464 -1473.

  • V. Shoup. Practical Threshold Signatures. In: Eurocrypt 2000, LNCS 1807, pp. 207-220. Springer-Verlag, 2000.

2001

  • I. Damgård, and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In: Eurocrypt'01, LNCS 2045, pp. 152-165. Springer-Verlag, 2001. .

  • P.-A. Fouque, and J. Stern. One round threshold discrete-log key generation without private channels. In: PKC'01, LNCS 1992, pp. 300-316. Berlin: Springer-Verlag, 2001.

  • P.-A. Fouque, and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In: Asiacrypt'01, LNCS 2248, pp. 351-368. Berlin: Springer-Verlag, 2001.

  • P.-A. Fouque and J. Stern. Fully Distributed Threshold RSA under Standard Assumptions. In: ASIACRYPT 2001, LNCS 2248, pp. 310-330. Springer-Verlag, 2001.

  • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. Information and Computation, 164(1): 54-84, 2001. An earlier version appeared in Eurocrypt'96.

  • J. Hoffstein, J. Pipher, and J. H. Silverman. NSS: An NTRU Lattice-Based Signature Scheme. In: EUROCRYPT 2001, LNCS 2045, pp. 211-228. Springer-Verlag, 2001.

  • Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang. ID-Based Structured Mulitsignature Schemes. Network Security 2001: 45-60. IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium. IFIP Conference Proceedings 206 Kluwer 2001, ISBN 0-7923-7558-0.

  • A. Lysyanskaya and C. Peikert. Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. In: ASIACRYPT 2001, LNCS 2248, pp. 331-350. Springer-Verlag, 2001.

  • P. D. MacKenzie and M. K. Reiter. Two-Party Generation of DSA Signatures. In: CRYPTO 2001, LNCS 2139, pp. 137-154. Springer-Verlag, 2001.

  • S. Micali, K. Ohta, and L. Reyzin. Accountable-subgroup multisignatures: extended abstract. In: Proc. of the 8th ACM Conference on Computer and Communications Security (CCS 2001), pp. 245-254. ACM, 2001.

  • Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. In: ICISC 1999, LNCS 1787, pp. 184-196.

  • D.R. Stinson, and R. Strobl. Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates. In: ACISP'01, LNCS 2119, pp. 417-434. Springer-Verlag, 2001.

  • T.-C. Wu, C.-C. Huang and D.-J. Guan. Delegated multisignature scheme with document decomposition. Journal of Systems and Software, January 2001, 55(3): 321-328.

2002

  • H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng. Forgery attacks on "Multisignature schemes for authenticating mobile code delegates". IEEE Transactions on Vehicular Technology, Nov 2002, 51(6): 1669-1671.

  • Y. Frankel, P. D. MacKenzie, and M. Yung. Adaptively secure distributed public-key systems. Theoretical Computer Science, 2002, 287(2): 535-561.

  • Yi Mu, Vijay Varadharajan. Group Cryptography: Signature and Encryption. Informatica (Slovenia), 2002, 26(3): 249-254.

  • S.-F. Pon, E.-H. Lu, and J.-Y. Lee. Dynamic reblocking RSA-based multisignatures scheme for computer and communication networks. IEEE Communications Letters, Jan 2002, 6(1): 43-44.

  • Mitsuru Tada. An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. In: Information Security and Privacy (ACISP'02), LNCS 2384, pp. 328-345. Springer-Verlag, 2002.

  • G. Wang. On the security of the Li-Hwang-Lee-Tsai threshold group signatures scheme. In: Information Security and Cryptography (ICISC 2002), LNCS 2587, pp. 75-89. Springer-Verlag, 2003.

  • X. Yi and C. K. Siew. Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, Nov 2002, 51(6): 1313-1315.

2003

  • A. Boldyreva. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Public Key Cryptography - PKC 2003, LNCS 2567, pp. 31–46. Springer-Verlag, 2003.

  • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: EUROCRYPT 2003, LNCS 2656, pp. 416-432. Springer-Verlag, 2003.

  • I. Damgård and M. Jurik. A Length-Flexible Threshold Cryptosystem with Applications. In: Information Security and Privacy (ACISP'03), LNCS 2727, pp. 350-364. Springer-Verlag, 2003.

  • Javier Herranz, Carles Padró, and Germán Sáez. Distributed RSA Signature Schemes for General Access Structures In: Information Security (ISC 2003), LNCS 2851, pp. 122-136. Springer-Verlag, 2003.

  • K. Kawauchi and M. Tada. On the Exact Security of Multi-signature Schemes Based on RSA. In: Information Security and Privacy (ACISP'03), LNCS 2727, pp. 336-349. Springer-Verlag, 2003.

  • Dongjin Kwak and Sangjae Moon. Efficient Distributed Signcryption Scheme as Group Signcryption. In: Applied Cryptography and Network Security (ACNS'03), LNCS 2846, pp. 403-417. Springer-Verlag, 2003.

  • Li-Shan Liu, Cheng-Kang Chu, and Wen-Guey Tzeng. A Threshold GQ Signature Scheme. In: Applied Cryptography and Network Security (ACNS'03), LNCS 2846, pp. 137-150. Springer-Verlag, 2003.

  • P. D. MacKenzie. An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Public Key Cryptography - PKC 2003, LNCS 2567, pp. 47-61. Springer-Verlag, 2003.

  • A. Nicolosi, M. Krohn, Y. Dodis, and D. Mazieres. Proactive Two-Party Signatures for User Authentication. In: Proceedings of NDSS'03. http://www.isoc.org/isoc/conferences/ndss/03/proceedings/index.htm

  • Rui Zhang and Hideki Imai. Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. In: Applied Cryptography and Network Security (ACNS'03), LNCS 2846, pp. 96-110. Springer-Verlag, 2003.

  • Guilin Wang, Xiaoxi Han, and Bo Zhu. On the Security of Two Threshold Signature Schemes with Traceable Signers. In: Applied Cryptography and Network Security (ACNS'03), LNCS 2846, pp. 111-122. Springer-Verlag, 2003.

  • T.-C. Wu and C.-L. Hsu. Cryptanalysis of Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems. IEEE Transactions on Vehicular Technology, March 2003, 52(2): 462 -465.

  • S. Xu and R. Sandhu. Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures
    In: CT-RSA 2003, LNCS 2612, p. 355-372. Springer-Verlag, 2003.

2003

  • Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham. Sequential Aggregate Signatures from Trapdoor Permutations. In: EUROCRYPT 2004, LNCS 3027, pp. 74-90. Springer-Verlag, 2004.

2004

  • Masayuki Abe, Serge Fehr. Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. In: CRYPTO 2004, LNCS 3152, pp. 317-334. Springer-Verlag, 2004. Full version available at http://eprint.iacr.org/2004/119/.

  • Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik. A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. In: Security in Communication Networks (SCN 2004), LNCS 3352, pp. 193-207. Springer-Verlag, 2005. BibTeX

  • Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim. New ID-based Threshold Signature Scheme from Bilinear Pairings. In: INDOCRYPT 2004, LNCS 3348, pp. 371-383. Springer- Verlag, 2004.

  • Giovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge. Threshold Cryptography for Mobile Ad Hoc Networks. In: Security in Communication Networks (SCN 2004), LNCS 3352, pp. 91-104. Springer-Verlag, 2005. BibTeX
  • Sherman S. M. Chow, Lucas C.K. Hui, S.M. Yiu, K.P. Chow. Secure Hierarchical Identity Based Signature and its Application. In: Information and Communications Security (ICICS 2004), LNCS 3269, pp. 480-494. Springer-Verlag, 2004.

  • Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu. Identity Based Threshold Ring Signature. In: Information Security and Cryptology - ICISC 2004, LNCS ????, pp. ??-??. Springer-Verlag, 2005. Primary version is available at http://eprint.iacr.org/2004/179/.

  • Javier Herranz, Germán Sáez. Distributed Ring Signatures for Identity-Based Scenarios. http://eprint.iacr.org/2004/190/.

  • Fabien Laguillaumie, Damien Vergnaud. Multi-Designated Verifiers Signatures. In: Information and Communications Security (ICICS 2004), LNCS 3269, pp. 495-507. Springer-Verlag, 2004.

  • Einar Mykletun, Maithili Narasimha, Gene Tsudik. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. http://eprint.iacr.org/2004/091/.

  • Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, and Duncan S. Wong.
    Separable Linkable Threshold Ring Signatures. In: INDOCRYPT 2004, LNCS 3348, pp. 384-398. Springer- Verlag, 2004. Full version available at http://eprint.iacr.org/2004/267/.

  • Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. http://eprint.iacr.org/2004/039/.

  • Jing Xu, Zhenfeng Zhang, Dengguo Feng. Identity Based Threshold Proxy Signature. http://eprint.iacr.org/2004/250/.

2005

  • Ivan Damgård, Kasper Dupont. Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. In: Public Key Cryptography - PKC 2005, LNCS 3386, pp. 346-361. Springer-Verlag, 2005. BibTeX

  • Toshiyuki Isshiki, Keisuke Tanaka. An (n-t)-out-of-n Threshold Ring Signature Scheme. In: Information Security and Privacy (ACISP 2005), LNCS 3574, pp. 406-416. Springer-Verlag, 2005. BibTeX

  • Stanislaw Jarecki, Nitesh Saxena. Further Simplifications in Proactive RSA Signatures. In: Theory of Cryptography (TCC 2005), LNCS 3378, pp. 510-528. Springer-Verlag, 2005. BibTeX

  • Brian King. An Efficient Implementation of a Threshold RSA Signature Scheme. In: Information Security and Privacy (ACISP 2005), LNCS 3574, pp. 382-393. Springer-Verlag, 2005. BibTeX

2006

2007

  • Mihir Bellare and Gregory Neven. Identity-Based Multi-Signatures from RSA. In: Topics in Cryptology - CT-RSA 2007, LNCS ????, pp. ??-??. Springer-Verlag, 2007.

1 comment:

electronic signature FAQ said...

As you stated that Bibliography on Group-Oriented Signatures.It is always useful to create an up-to-date bibliography on different subjects and make it available on the Internet for other people.As you provided year wise so its really informative.