Proxy blind multi-signature scheme without a secure channel

被引:12
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
Zhou, Y [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
关键词
proxy signature; proxy multi-signature; blind signature; discrete logarithm;
D O I
10.1016/j.amc.2004.04.063
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Proxy signature and blind signature are two active cryptographic research areas, and have been applied in many occasions respectively. At the same time, to cope with some particular settings, proxy blind signature, two signatures combination, also becomes a current research hotspot. To our knowledge, many proxy blind signature schemes have been put forth till now. However, most of these proposed schemes have not been provably secure and all should rely on secure channels to transmit proxy secret key, and yet a secure channel could not always be obtained in Current network environment. Therefore, in this paper, we would like to present a new proxy blind multi-signature scheme, which does not need a secure channel and is provably secure under the Random Oracle model. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 187
页数:9
相关论文
共 50 条
  • [31] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [32] Provably secure proxy blind signature scheme
    Kim, Young-Seol
    Chang, Jik-Hyun
    [J]. ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 998 - +
  • [33] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    [J]. JournalofElectronics., 2006, (04) - 563
  • [34] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    [J]. 信息安全与通信保密, 2005, (07) : 133 - 137
  • [35] Cryptanalysis of an identity based proxy multi-signature scheme
    Li, Fagen
    Zhou, Shijie
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1820 - 1823
  • [36] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [37] Improvement of a Multi-proxy Multi-signature Scheme in the Standard Model
    Fan, Haiwei
    Zhao, Xiangmo
    Ming, Yang
    Du, Jin
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4737 - 4742
  • [38] Improvement of identity-based proxy multi-signature scheme
    Shao, Zuhua
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) : 794 - 800
  • [39] On the security of an identity-based proxy multi-signature scheme
    Wang, B.
    [J]. IET INFORMATION SECURITY, 2010, 4 (02) : 45 - 48
  • [40] A Secure Proxy Blind Signature Scheme Based on ECDLP
    Hu, Lanlan
    Zheng, Kangfeng
    Hu, Zhengming
    Yang, Yixian
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457