Identity based proxy multi-signature

被引:27
|
作者
Wang, Qin [1 ]
Cao, Zhenfu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
proxy mufti-signature; identity based signature; formalized definition; provable security; bilinear pairings;
D O I
10.1016/j.jss.2006.12.565
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a variation of ordinary digital signature scheme, a proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. Proxy mufti-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to the same other entity. Combining proxy mufti-signature with identity based cryptography, in this paper, we define security notions for identity based proxy mufti-signature schemes. We also construct a concrete identity based proxy mufti-signature scheme which is provably secure in the random oracle model under the computational Diffie-Hellman assumption over pairing-friendly groups. Furthermore, the new scheme is very simple and efficient computationally. It has the property that the size of a proxy mufti-signature is independent of the number of the original signers. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:1023 / 1029
页数:7
相关论文
共 50 条
  • [31] A New Anonymous Proxy Multi-Signature Scheme
    Yin Xin-chun
    Ou Fu-na
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 445 - 448
  • [32] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [33] Proxy Multi-Signature Scheme in the Standard Model
    Fan, Hai-wei
    Ming, Yang
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
  • [34] Independent verification of proxy multi-signature scheme
    College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
    [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
  • [35] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [36] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [37] Formal model of proxy multi-signature and a construction
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    [J]. Jisuanji Xuebao, 2006, 9 (1628-1635):
  • [38] Threshold multi-proxy multi-signature scheme based on bilinear pairings
    Wu, Tzong-Sun
    Lin, Han-Yu
    Shiu, Ming-Je
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
  • [39] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [40] Provable Security of ID-Based Proxy Multi-Signature Schemes
    GU Chunxiang
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 87 - 90