A Secure Anonymous Proxy Multi-signature Scheme

被引:0
|
作者
Saraswat, Vishal [1 ]
Sahu, Rajeev Anand [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Andhra Pradesh, India
关键词
Identity-based Cryptography; Bilinear Map; CDHP; Provable Security; Digital Signature; Signing Rights Delegation; Proxy Multi-signature; Anonymity; Accountability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. We propose an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The proposed scheme is proved secure against adaptive chosen-message and adaptive chosen-ID attacks under the computational Diffie-Hellman assumption. We compare our scheme with the recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.
引用
收藏
页码:55 / 66
页数:12
相关论文
共 50 条
  • [31] Cryptanalysis of an identity based proxy multi-signature scheme
    Li, Fagen
    Zhou, Shijie
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1820 - 1823
  • [32] Analysis and Improvement of Proxy Blind Multi-Signature Scheme
    Tang, Pengzhi
    Chen, Renqun
    [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 144 - 154
  • [33] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [34] Improvement of a Multi-proxy Multi-signature Scheme in the Standard Model
    Fan, Haiwei
    Zhao, Xiangmo
    Ming, Yang
    Du, Jin
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4737 - 4742
  • [35] Improvement of identity-based proxy multi-signature scheme
    Shao, Zuhua
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) : 794 - 800
  • [36] On the security of an identity-based proxy multi-signature scheme
    Wang, B.
    [J]. IET INFORMATION SECURITY, 2010, 4 (02) : 45 - 48
  • [37] Identity-based multi-proxy multi-signature scheme provably secure in random oracle model
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (04): : 547 - 558
  • [38] Certificateless proxy multi-signature
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. INFORMATION SCIENCES, 2014, 276 : 21 - 30
  • [39] Improvement of a proxy multi-signature scheme without random oracles
    Sun, Ying
    Xu, Chunxiang
    Yu, Yong
    Yang, Bo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 257 - 263
  • [40] A new proxy multi-signature scheme and the elliptic curve cryptography
    Cheng, Xu
    Li, MingChu
    Zhao, Kaiqin
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, : 180 - 184