Forward secure certificateless proxy multi-signature scheme

被引:1
|
作者
Gao, Ronghai [1 ]
Zeng, Jiwen [2 ,3 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Xinjiang Normal Univ, Sch Math Sci, Urumqi 830017, Peoples R China
[3] Xiamen Univ, Sch Math Sci, Xiamen 361005, Peoples R China
关键词
certificateless cryptography; proxy signature; proxy multi-signature; PMS; forward secure; computational Diffie-Hellman problem; CDHP; DIGITAL SIGNATURE; MODEL;
D O I
10.1504/IJESDF.2021.111718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy multi-signature scheme, and give the formal definition and security model of forward secure certificateless proxy multi-signature. Furthermore, we present a construction of forward secure certificateless proxy multi-signature scheme. Based on the difficulty of computational Diffie-Hellman problem, the proposed scheme is existentially unforgeable against adaptively chosen-message attacks and chosen-warrant attacks in the random oracle model. The proposed scheme does not use bilinear pairs in the key update and generation proxy signature phases, and updated proxy key is easy, thus it is more suitable for mobile environments. Our scheme has effectively dealt with the key exposure problem and certificate management problem.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [1] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [2] Certificateless proxy multi-signature
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. INFORMATION SCIENCES, 2014, 276 : 21 - 30
  • [3] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [4] A Secure Anonymous Proxy Multi-signature Scheme
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 55 - 66
  • [5] Secure Proxy Multi-signature Scheme in the Standard Model
    Liu, Zhenhua
    Hu, Yupu
    Ma, Hua
    [J]. PROVABLE SECURITY, 2008, 5324 : 127 - +
  • [6] Proxy blind multi-signature scheme without a secure channel
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 179 - 187
  • [7] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [8] Provably Secure Proxy Multi-Signature Scheme Based on ECC
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 199 - 204
  • [9] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [10] Security of a Certificateless Proxy Signature Scheme with Blind and Forward Secure in the Random Oracle
    Liu, Yan
    Xu, Xiaolin
    Tan, Wenan
    [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 641 - 645