Computer Science ›› 2014, Vol. 41 ›› Issue (5): 133-136.doi: 10.11896/j.issn.1002-137X.2014.05.029

Previous Articles     Next Articles

Provably Secure Multi-proxy Multi-signature Scheme with Different Proxy Groups

LIU Dan-ni,WANG Xing-wei and HUANG Min   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In most of the existing multi-proxy multi-signature (MPMS) schemes,the same proxy group is delegated the proxy right to sign by all the original members.Nevertheless,in many practical applications,original signer often demands to designate the proxy group in his own organization which is different from others’.It is seldom considered in the MPMS schemes.In this paper,we proposed a MPMS scheme with different proxy groups.Furthermore,in our scheme,when the final proxy signature is being authenticated,a group of specified verifiers have the access.To proved the safety of the new scheme,we improved a security model to testify that the new one is secure based on the computational Diffie-Hellman assumption.Compared with the previous scheme,the new one offers tighter safety and better computational efficiency.

Key words: Cryptography,Multi-proxy multi-signature (MPMS),Proxy group

[1] Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multisignatures[J].NEC RES DEVELOP,1983(71):1-8
[2] Tzeng S,Yang C,Hwang M.A new multi-proxy multi-signature scheme[J].2002,0-138
[3] Hwang S J,Chen C C.New multi-proxy multi-signature schemes[J].Applied Mathematics and Computation,2004,7(1):57-67
[4] Tzeng S F,Yang C Y,Hwang M S.A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Future Generation Computer Systems,2004,0(5):887-893
[5] Bao H Y,Cao Z F,Wang S B.Improvement on Tzeng et al.′s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Applied Mathematics and Computation,2005,9(2):1419-1430
[6] Hsu C L,Tsai K Y,Tsai P L.Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Inf Sci,2007,7(2):543-549
[7] Mashhadi S.Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification[C]∥Scientia Iranica.2012:1-6
[8] 霍亮,杨柳,李明祥.基于身份的多重代理签名的安全模型[J].计算机科学,2012,9(6A):41-43
[9] Kang B Y,Boyd C,Dawson E.A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Computers & Electrical Engineering,2009,5(1):9-17
[10] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263
[11] Liu Z H,Hu Y P,Zhang X S,et al.Provably secure multi-proxy signature scheme with revocation in the standard model [J].COMPUT COMMUN,2011,4(3):494-501
[12] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263
[13] Waters B.Efficient identity-based encryption without randomoracles[M]∥Advances in Cryptology-EUROCRYPT Springer Berlin Heidelberg,2005:114-127

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!