Proxy blind multi-signature scheme without a secure channel

被引:12
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
Zhou, Y [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
关键词
proxy signature; proxy multi-signature; blind signature; discrete logarithm;
D O I
10.1016/j.amc.2004.04.063
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Proxy signature and blind signature are two active cryptographic research areas, and have been applied in many occasions respectively. At the same time, to cope with some particular settings, proxy blind signature, two signatures combination, also becomes a current research hotspot. To our knowledge, many proxy blind signature schemes have been put forth till now. However, most of these proposed schemes have not been provably secure and all should rely on secure channels to transmit proxy secret key, and yet a secure channel could not always be obtained in Current network environment. Therefore, in this paper, we would like to present a new proxy blind multi-signature scheme, which does not need a secure channel and is provably secure under the Random Oracle model. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 187
页数:9
相关论文
共 50 条
  • [1] Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel
    Sun, Ying
    Xu, Chunxiang
    Xia, Qi
    Yu, Yong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 661 - 664
  • [2] A Secure Anonymous Proxy Multi-signature Scheme
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 55 - 66
  • [3] Secure Proxy Multi-signature Scheme in the Standard Model
    Liu, Zhenhua
    Hu, Yupu
    Ma, Hua
    [J]. PROVABLE SECURITY, 2008, 5324 : 127 - +
  • [4] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [5] Forward secure certificateless proxy multi-signature scheme
    Gao, Ronghai
    Zeng, Jiwen
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 1 - 27
  • [6] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    [J]. 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [7] Analysis and Improvement of Proxy Blind Multi-Signature Scheme
    Tang, Pengzhi
    Chen, Renqun
    [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 144 - 154
  • [8] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [9] Provably Secure Proxy Multi-Signature Scheme Based on ECC
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 199 - 204
  • [10] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    [J]. ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528