A Secure Anonymous Proxy Multi-signature Scheme

被引:0
|
作者
Saraswat, Vishal [1 ]
Sahu, Rajeev Anand [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Andhra Pradesh, India
关键词
Identity-based Cryptography; Bilinear Map; CDHP; Provable Security; Digital Signature; Signing Rights Delegation; Proxy Multi-signature; Anonymity; Accountability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. We propose an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The proposed scheme is proved secure against adaptive chosen-message and adaptive chosen-ID attacks under the computational Diffie-Hellman assumption. We compare our scheme with the recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.
引用
收藏
页码:55 / 66
页数:12
相关论文
共 50 条
  • [21] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [22] Proxy Multi-Signature Scheme in the Standard Model
    Fan, Hai-wei
    Ming, Yang
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
  • [23] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    [J]. Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [24] Independent verification of proxy multi-signature scheme
    College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
    [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
  • [25] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [26] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [27] A Multi-proxy Multi-signature Scheme with Different Proxy Groups
    Liu, Danni
    Wang, Lijuan
    Wu, Dongdong
    Wei, Honglei
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1414 - 1418
  • [28] A new anonymous but accountable secure proxy signature scheme
    Du, He
    Wang, Jian
    Liu, Yanan
    [J]. International Journal of Digital Content Technology and its Applications, 2012, 6 (09) : 204 - 210
  • [29] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    [J]. Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [30] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428