计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 133-136.doi: 10.11896/j.issn.1002-137X.2014.05.029

• 信息安全 • 上一篇    下一篇

具有不同代理群的多代理多签名方案

刘丹妮,王兴伟,黄敏   

  1. 东北大学信息科学与工程学院 沈阳110004;东北大学信息科学与工程学院 沈阳110004;东北大学信息科学与工程学院 沈阳110004
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家杰出青年科学基金项目(61225012),国家自然科学基金项目(61070162,71071028,70931001),高等学校博士学科点专项科研基金优先发展领域课题(20120042130003),高等学校博士学科点专项科研基金课题(20100042110025,20110042110024),工信部物联网发展专项资金项目,中央高校基本科研业务费专项资金项目(N110204003)资助

Provably Secure Multi-proxy Multi-signature Scheme with Different Proxy Groups

LIU Dan-ni,WANG Xing-wei and HUANG Min   

  • Online:2018-11-14 Published:2018-11-14

摘要: 目前在大多数多代理多签名(multi-proxy multi-signature,MPMS)方案中,所有的原始签名人指定同一个代理群生成代理签名。然而在很多实际应用中,每个原始签名人经常需要在自己所在的组织中选择代理群,从而导致各个原始签名人需要选择不同的代理群,代表自己生成代理签名。现有的多代理多签名方案中还没有考虑这方面的需求。提出一个可以指定不同代理群的MPMS方案。在该方案中,可以指定一个多人的验证群合作验证最终签名的合法性。为证明方案的安全性,对现有的安全模型进行改进,在计算Diffie-Hellman假设的基础上,验证所提方案是安全的。与已有方案相比,本方案更加安全和有效。

关键词: 密码学,多代理多签名,代理群

Abstract: In most of the existing multi-proxy multi-signature (MPMS) schemes,the same proxy group is delegated the proxy right to sign by all the original members.Nevertheless,in many practical applications,original signer often demands to designate the proxy group in his own organization which is different from others’.It is seldom considered in the MPMS schemes.In this paper,we proposed a MPMS scheme with different proxy groups.Furthermore,in our scheme,when the final proxy signature is being authenticated,a group of specified verifiers have the access.To proved the safety of the new scheme,we improved a security model to testify that the new one is secure based on the computational Diffie-Hellman assumption.Compared with the previous scheme,the new one offers tighter safety and better computational efficiency.

Key words: Cryptography,Multi-proxy multi-signature (MPMS),Proxy group

[1] Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multisignatures[J].NEC RES DEVELOP,1983(71):1-8
[2] Tzeng S,Yang C,Hwang M.A new multi-proxy multi-signature scheme[J].2002,0-138
[3] Hwang S J,Chen C C.New multi-proxy multi-signature schemes[J].Applied Mathematics and Computation,2004,7(1):57-67
[4] Tzeng S F,Yang C Y,Hwang M S.A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Future Generation Computer Systems,2004,0(5):887-893
[5] Bao H Y,Cao Z F,Wang S B.Improvement on Tzeng et al.′s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Applied Mathematics and Computation,2005,9(2):1419-1430
[6] Hsu C L,Tsai K Y,Tsai P L.Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Inf Sci,2007,7(2):543-549
[7] Mashhadi S.Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification[C]∥Scientia Iranica.2012:1-6
[8] 霍亮,杨柳,李明祥.基于身份的多重代理签名的安全模型[J].计算机科学,2012,9(6A):41-43
[9] Kang B Y,Boyd C,Dawson E.A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Computers & Electrical Engineering,2009,5(1):9-17
[10] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263
[11] Liu Z H,Hu Y P,Zhang X S,et al.Provably secure multi-proxy signature scheme with revocation in the standard model [J].COMPUT COMMUN,2011,4(3):494-501
[12] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263
[13] Waters B.Efficient identity-based encryption without randomoracles[M]∥Advances in Cryptology-EUROCRYPT Springer Berlin Heidelberg,2005:114-127

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!