A Proxy Multi-Signature Scheme with Forward-Secure

被引:0
|
作者
Liang, Xiang-Qian [1 ]
Zhang, Yun [1 ]
Zhang, Yong-Hua [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Informat & Comp Sci, Qingdao, Shandong, Peoples R China
关键词
forward security; proxy multi-signature; bilinear mapping; computational Diffie-Hellman problem(CDHP); hierarchical ID-based signature(HIBS);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proxy multi-signature scheme allow a proxy signer to represent a group of users to sign a document. Like most of digital signature schemes, its security wholly depends on the security of secret keys. Once secret keys are exposed, all preciously assigned signatures must be reissued. Forward-secure signatures are used to address this problem, in which all previously generated signatures are still considered to be valid even after secret keys are compromised. In this paper, by borrowing the idea of hierarchical ID-based signature (HIBS), we integrated forward security into the proxy multi-signature scheme and proposed a proxy multi-signature scheme with forward-secure which supports the efficient batch verification of several signatures of the same message under different public keys. The security of our scheme relies on the hardness of computational Diffie-Hellman problem(CDHP) and Hash function.
引用
收藏
页码:794 / 798
页数:5
相关论文
共 50 条
  • [1] Forward secure certificateless proxy multi-signature scheme
    Gao, Ronghai
    Zeng, Jiwen
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 1 - 27
  • [2] An Improved Forward-Secure Multi-Proxy Signature Scheme
    Zhang, Jun
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 43 - 46
  • [3] Transferable e-cheques using Forward-Secure Multi-signature Scheme
    Sunitha, N. R.
    Amberker, B. B.
    Koulgi, Prashant
    [J]. WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 257 - 262
  • [4] A Strong Forward-Secure Proxy Blind Signature Scheme
    Zhang, Long
    Lu, Shuyi
    [J]. ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1391 - 1396
  • [5] A Secure Anonymous Proxy Multi-signature Scheme
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 55 - 66
  • [6] Forward-secure proxy signature scheme for cellphone service providers
    Sunitha, N. R.
    Amberker, B. B.
    [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 225 - +
  • [7] Secure Proxy Multi-signature Scheme in the Standard Model
    Liu, Zhenhua
    Hu, Yupu
    Ma, Hua
    [J]. PROVABLE SECURITY, 2008, 5324 : 127 - +
  • [8] Secure e-cheques for Joint Accounts with collective signing using Forward-secure Multi-signature scheme
    Sunitha, N. R.
    Amberker, B. B.
    Koulgi, Prashant
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 241 - +
  • [9] A NEW FORWARD-SECURE THRESHOLD PROXY RE-SIGNATURE SCHEME
    Yang, Xiaodong
    Wang, Caifen
    Zhang, Yulei
    Wei, Weiyi
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 566 - 569
  • [10] Proxy blind multi-signature scheme without a secure channel
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 179 - 187