Certificateless proxy multi-signature

被引:15
|
作者
Du, Hongzhen [1 ]
Wen, Qiaoyan [2 ]
机构
[1] Baoji Univ Arts & Sci, Dept Math, Baoji 721007, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; Proxy signature; Proxy multi-signature; Bilinear pairing; Computational Diffie-Hellman problem; BILINEAR PAIRINGS; SECURITY MODEL; SCHEMES; CONSTRUCTION;
D O I
10.1016/j.ins.2014.02.043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy multi-signature allows a group of original signers to delegate their signing capabilities to a proxy signer in such a way that the proxy signer can sign messages on behalf of the group of original signers. Existing constructions of proxy multi-signatures are based on traditional Public Key Infrastructure or Identity-based Public Key Setting, but the former needs certificates which bring about many certificate management problems, and the latter has a drawback of key escrow. In contrast to the existing constructions, in this paper, we study proxy multi-signature in Certificateless Public Key Cryptography (CL-PKC) which combines the advantages of both certificate-based and identity-based cryptosystems as it avoids the use of certificates and does not suffer from key escrow. We provide the definition and the security model for Certificateless Proxy Multi-Signature (CLPMS), and propose the first CLPMS scheme which is proved to be secure in the random oracle model under the computational Diffie-Hellman assumption. Our scheme is computationally efficient and has the property that the size of a proxy multi-signature is independent of the number of the original signers. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 50 条
  • [21] A New Anonymous Proxy Multi-Signature Scheme
    Yin Xin-chun
    Ou Fu-na
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 445 - 448
  • [22] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [23] Proxy Multi-Signature Scheme in the Standard Model
    Fan, Hai-wei
    Ming, Yang
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
  • [25] Improved certificateless multi-proxy signature
    XU Jie SUN Hongxiang WEN Qiaoyan ZHANG Hua School of ScienceBeijing University of Posts and TelecommunicationsBeijing China State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing China
    [J]. The Journal of China Universities of Posts and Telecommunications., 2012, 19 (04) - 105+116
  • [26] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [27] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [28] A Novel Certificateless Multi-signature Scheme over NTRU Lattices
    Chen, Xinjian
    Huang, Qiong
    Huang, Jianye
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 345 - 362
  • [29] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [30] On constructing certificateless proxy signature from certificateless signature
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Hong X.
    Long Y.
    Jia W.-W.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 692 - 694