Proxy blind multi-signature scheme without a secure channel

被引:12
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
Zhou, Y [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
关键词
proxy signature; proxy multi-signature; blind signature; discrete logarithm;
D O I
10.1016/j.amc.2004.04.063
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Proxy signature and blind signature are two active cryptographic research areas, and have been applied in many occasions respectively. At the same time, to cope with some particular settings, proxy blind signature, two signatures combination, also becomes a current research hotspot. To our knowledge, many proxy blind signature schemes have been put forth till now. However, most of these proposed schemes have not been provably secure and all should rely on secure channels to transmit proxy secret key, and yet a secure channel could not always be obtained in Current network environment. Therefore, in this paper, we would like to present a new proxy blind multi-signature scheme, which does not need a secure channel and is provably secure under the Random Oracle model. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 187
页数:9
相关论文
共 50 条
  • [41] Identity-based multi-proxy multi-signature scheme provably secure in random oracle model
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (04): : 547 - 558
  • [42] Certificateless proxy multi-signature
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. INFORMATION SCIENCES, 2014, 276 : 21 - 30
  • [43] A Secure Proxy Blind Signature Scheme Using ECC
    Alghazzawi, Daniyal M.
    Salim, Trigui Mohamed
    Hasan, Syed Hamid
    [J]. NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 47 - 52
  • [44] A new proxy multi-signature scheme and the elliptic curve cryptography
    Cheng, Xu
    Li, MingChu
    Zhao, Kaiqin
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, : 180 - 184
  • [45] Independent Verification of Proxy Multi-signature without Random Oracle
    Du He
    Wang Jian
    Guo Li-hong
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2643 - 2648
  • [46] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [47] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2008, (02) : 180 - 184
  • [48] ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    Li, XG
    Chen, KF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 437 - 450
  • [49] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [50] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893