Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 272-276.

Previous Articles     Next Articles

Certificate-based Multi-proxy Multi-signature Scheme

ZHOU Cai-xue and TAN Xu-jie   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper gave out a formal definition and security notions of certificate-based multi-proxy multi-signature schemes,and proposed a concrete scheme without using bilinear pairings.It was proved to be existentially unforgeable in random oracle model under elliptic curve discrete logarithm assumption.Performance analysis shows the scheme is of high efficiency.

Key words: Certificate-based multi-proxy multi-signature,Random oracle model,Public key replacement attack,Bilinear pairings

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceeding of Crypto’84.LNCS 196,Berlin:Springer-Verlag,1984:47-53
[2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceeding of ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473
[3] Gentry C.Certificate-based encryption and the certificate revocation problem[C]∥Proc.of EuroCrypt.Berlin:Springer-Verlag,2003:272-293
[4] Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1353
[5] Hwang S J,Chen C C.A New Multi-Proxy Multi-SignatureScheme[C]∥2001 National Computer Symposium:Information Security.Taiwan,2001:19-26
[6] Kang B G,Park J H,Hahn S G.A certificate-based signaturescheme[C]∥Proc.of CT-RSA.Berlin:Springer-Verlag,2004:99-111
[7] 陈辉焱,李巍,苏艳芳.一种基于证书的代理环签名方案[J].计算机工程,2012,38(16):149-152
[8] 韩春霞,王琳杰.基于证书的多重代理多重盲签名方案研究[J].长江大学学报:自然科学版,2013,10(19):61-64
[9] 翟正元,高德智,梁向前,等.新的基于证书的代理盲签名方案[J].计算机工程与应用,2014,0(4):57-62
[10] Boldyreva A,Palacio A,Warinschi B.Secure proxy signatureschemes for delegation of signing rights[J].Journal of cryptology,2012,25(1):57-115
[11] Wang Qin,Cao Zhen-fu.Security arguments for partial delegation with warrant proxy signature schemes[EB/OL].[2004-11-17].http://erpint.iacr.org/2004/315.pdf
[12] Li Ji-guo,Huang Xin-yi,Mu Yi,et al.Certificate-based signature:security model and efficient construction[C]∥Proc.of EuroPKI’2007.2007:110-125
[13] Wu Wei,Mu Yi,Susilo W,et al.Certificate-based signatures revisited[J].Journal of universal computer science,2009,15(8):1659-1684
[14] Li Ji-guo,Xu Li-zhong,Zhang Yi-chen.Provably secure certificate-based proxy signature schemes[J].Journal of Computers,2009,4(6):444-452
[15] 陈江山.基于证书的代理签名和盲签名[D].漳州:漳州师范学院,2012
[16] Bellare M,Neven G.Multi-signatures in the plain public-keymodel and a general forking lemma[C]∥Proc of CCS’ 06.Alexandria:ACM,2006:390-399
[17] Tiwari N,Padhye S,He D.Efficient ID-based multiproxy multisignature without bilinear maps in ROM[J].Annals of telecommunications,2013,68(3-4):231-237
[18] Li Xiang-xue,Chen Ke-fei.ID-based multi-proxy signature,proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings[J].Appl Math Comput,2005(169):437-450
[19] Sahu R A,Padhye S.An ID-based multi-proxy multisignature scheme[C]∥Proceeding of IEEE international conference on computer & communication technology(ICCCT-2010).2010:60-63

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!