Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups

被引:5
|
作者
Liu, D. [1 ,2 ]
Wang, X. [1 ]
Huang, M. [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110004, Peoples R China
[2] Dalian Neusoft Inst Informat, Dept Comp Sci & Technol, Dalian 116023, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
information security; cryptography; threshold signature; multi-proxy multi-signature; discrete logarithm; unforgeability;
D O I
10.1002/dac.2567
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the majority of threshold multi-proxy multi-signature (TMPMS) schemes, only one proxy group is authorized to sign on behalf of all the original members. However, the original signers in various practical applications are often from different organizations. Each original signer should be able to designate a proxy group in his own organization; thus, each original signer could have distinct proxy members. However, this practical requirement of TMPMS schemes is seldom considered. To satisfy this requirement, we propose a new TMPMS scheme in which each original member can designate a proxy group in his own organization. Moreover, the threshold value of each proxy group is unique. We develop a security model to prove the high security and strong unforgeability of the proposed scheme. We analyze the security of our scheme based on the four types of adversaries tested in the security model. Compared with previous schemes, the new scheme offers higher security and superior computational efficiency. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3693 / 3705
页数:13
相关论文
共 50 条
  • [1] A Multi-proxy Multi-signature Scheme with Different Proxy Groups
    Liu, Danni
    Wang, Lijuan
    Wu, Dongdong
    Wei, Honglei
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1414 - 1418
  • [2] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [3] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    [J]. 信息安全与通信保密, 2005, (07) : 133 - 137
  • [4] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    [J]. Journal of Electronics, 2006, (04) : 560 - 563
  • [5] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    [J]. J. Comput. Inf. Syst., 2009, 5 (1375-1380):
  • [6] Nonrepudiable multi-proxy multi-signature scheme
    Xue, QS
    Cao, ZF
    [J]. SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 102 - 105
  • [7] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [8] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    [J]. Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [9] Threshold multi-proxy multi-signature scheme based on bilinear pairings
    Wu, Tzong-Sun
    Lin, Han-Yu
    Shiu, Ming-Je
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
  • [10] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893