Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model

被引:0
|
作者
Zhang, Jian-Hong [1 ]
Mao, Jian [2 ]
机构
[1] North China Univ Technol, Inst Image Proc & Pattern Recognit, Beijing 100144, Peoples R China
[2] Beihang Univ, Elect & Informat Engn, Beijing 10083, Peoples R China
关键词
strong unforgeability; short signature; multi-proxy signature; the computational Diffie-Hellman problem; efficiency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of multi-proxy signature. These problems restrict its application since many devices has limited computation capacity and storage space. In this work, a novel multi-proxy signature scheme with short length in the standard model is proposed. The scheme can not only achieve strong unforgeability, but also has short length of the signature. Compared with the other three multi-proxy signature schemes, the proposed scheme has the great advantages over the other three schemes. To the best of our knowledge, our proposed multi-proxy signature scheme is the first shortest size, whose signature length is only 320 bits for a security level of 80 bits and the same length as that of DSA.
引用
收藏
页码:1097 / 1112
页数:16
相关论文
共 50 条
  • [31] Multi-proxy Strong Blind Quantum Signature Scheme
    Wei Guo
    Jian-Zhong Zhang
    Yan-Ping Li
    Wan An
    [J]. International Journal of Theoretical Physics, 2016, 55 : 3524 - 3536
  • [32] Secure Proxy Multi-signature Scheme in the Standard Model
    Liu, Zhenhua
    Hu, Yupu
    Ma, Hua
    [J]. PROVABLE SECURITY, 2008, 5324 : 127 - +
  • [33] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [34] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    [J]. J. Comput. Inf. Syst., 2009, 5 (1375-1380):
  • [35] A non-repudiable multi-proxy multi-signature scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    [J]. ICIC Express Letters, 2009, 3 (03): : 259 - 263
  • [36] Certificateless multi-proxy signature
    Jin, Zhengping
    Wen, Qiaoyan
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 344 - 352
  • [37] An Improved Forward-Secure Multi-Proxy Signature Scheme
    Zhang, Jun
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 43 - 46
  • [38] Improved Multi-proxy Signature Scheme without Random Oracles
    Sun Ying
    Xu Chunxiang
    Wang Hua
    Fu Chaoxu
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02) : 200 - 206
  • [39] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [40] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705