Independent Verification of Proxy Multi-signature without Random Oracle

被引:0
|
作者
Du He [1 ]
Wang Jian [1 ]
Guo Li-hong [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
关键词
privacy; proxy multi-signature; standard model; independent verification; SCHEME; IMPROVEMENT; SECURITY;
D O I
10.4028/www.scientific.net/AMM.321-324.2643
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy has become one of the most important human rights of the modem age. In a proxy multi-signature scheme, the verifier need get all the original signers' public keys together to verify its validity. However, the relationships between the proxy signer and the original signers would be leaked in the verification process. In this paper, we propose a secure proxy multi-signature scheme in standard model with the property of independent verification. In the scheme, the verifier can verify the signature using the public keys of the special original signers, rather than collecting all the original signers' public keys.
引用
收藏
页码:2643 / 2648
页数:6
相关论文
共 50 条
  • [1] Independent verification of proxy multi-signature scheme
    College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
    [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
  • [2] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [3] Improvement of a proxy multi-signature scheme without random oracles
    Sun, Ying
    Xu, Chunxiang
    Yu, Yong
    Yang, Bo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 257 - 263
  • [4] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    [J]. Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [5] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [6] Identity-based multi-proxy multi-signature scheme provably secure in random oracle model
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (04): : 547 - 558
  • [7] Certificateless proxy multi-signature
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. INFORMATION SCIENCES, 2014, 276 : 21 - 30
  • [8] A novel nonrepudiable multi-proxy multi-signature scheme with shared verification
    [J]. Qu, J. (qulujuan@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [9] Proxy blind multi-signature scheme without a secure channel
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 179 - 187
  • [10] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893