Nonrepudiable proxy multi-signature scheme

被引:16
|
作者
Li, JG [1 ]
Cao, ZF
Zhang, YC
机构
[1] Harbin Inst Technol, Dept Comp Sci & Engn, Harbin 150001, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
nonrepudiable; digital signature; proxy signature; multi-signature;
D O I
10.1007/BF02948911
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto; allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition,, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.
引用
收藏
页码:399 / 402
页数:4
相关论文
共 50 条
  • [41] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [42] ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    Li, XG
    Chen, KF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 437 - 450
  • [43] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [44] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    [J]. 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [45] On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
    Yang, CY
    Tzeng, SF
    Hwang, MS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 507 - 514
  • [46] Cryanalysis on a nonrepudiable threshold proxy signature scheme with known signers
    Xiao, Hongguang
    Tan, Zuowen
    Jian, Wang
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 809 - +
  • [47] An Anonymous Proxy Multi-signature with Accountablility
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 234 - 254
  • [48] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [49] New nonrepudiable threshold proxy signature scheme with known signers
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 119 - 124
  • [50] Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme
    Kar, Jayaprakash
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 291 - 300