计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 133-136.doi: 10.11896/j.issn.1002-137X.2014.05.029
刘丹妮,王兴伟,黄敏
LIU Dan-ni,WANG Xing-wei and HUANG Min
摘要: 目前在大多数多代理多签名(multi-proxy multi-signature,MPMS)方案中,所有的原始签名人指定同一个代理群生成代理签名。然而在很多实际应用中,每个原始签名人经常需要在自己所在的组织中选择代理群,从而导致各个原始签名人需要选择不同的代理群,代表自己生成代理签名。现有的多代理多签名方案中还没有考虑这方面的需求。提出一个可以指定不同代理群的MPMS方案。在该方案中,可以指定一个多人的验证群合作验证最终签名的合法性。为证明方案的安全性,对现有的安全模型进行改进,在计算Diffie-Hellman假设的基础上,验证所提方案是安全的。与已有方案相比,本方案更加安全和有效。
[1] Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multisignatures[J].NEC RES DEVELOP,1983(71):1-8 [2] Tzeng S,Yang C,Hwang M.A new multi-proxy multi-signature scheme[J].2002,0-138 [3] Hwang S J,Chen C C.New multi-proxy multi-signature schemes[J].Applied Mathematics and Computation,2004,7(1):57-67 [4] Tzeng S F,Yang C Y,Hwang M S.A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Future Generation Computer Systems,2004,0(5):887-893 [5] Bao H Y,Cao Z F,Wang S B.Improvement on Tzeng et al.′s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Applied Mathematics and Computation,2005,9(2):1419-1430 [6] Hsu C L,Tsai K Y,Tsai P L.Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Inf Sci,2007,7(2):543-549 [7] Mashhadi S.Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification[C]∥Scientia Iranica.2012:1-6 [8] 霍亮,杨柳,李明祥.基于身份的多重代理签名的安全模型[J].计算机科学,2012,9(6A):41-43 [9] Kang B Y,Boyd C,Dawson E.A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Computers & Electrical Engineering,2009,5(1):9-17 [10] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263 [11] Liu Z H,Hu Y P,Zhang X S,et al.Provably secure multi-proxy signature scheme with revocation in the standard model [J].COMPUT COMMUN,2011,4(3):494-501 [12] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263 [13] Waters B.Efficient identity-based encryption without randomoracles[M]∥Advances in Cryptology-EUROCRYPT Springer Berlin Heidelberg,2005:114-127 |
No related articles found! |
|