Two Efficient Digital Multisignature Schemes

Hongwei Chu,Yinliang Zhao
DOI: https://doi.org/10.1109/iscid.2008.204
2008-01-01
Abstract:Based on Schnorr algorithm, by adopting ID code and time-limit approaches, propose two multisignature schemes which can prevent repeated broadcast attack and malicious delay in the process. For most of the computational effort for signature generation can be done in preprocessing stage, both identification and signature with high efficiency, and it's security is based on the difficulty of discrete logarithms problem. In the end, analyze the two schemes' security and efficiency in detail.
What problem does this paper attempt to address?