Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash

被引:2
作者
Bao, Haiyong [1 ]
Cao, Zhenfu [2 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, 18 Xuezheng St, Hangzhou 310018, Zhejiang, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Digital signature; group signature; proxy signature; group-proxysignature;
D O I
10.1515/jisys-2012-0024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present. However, with the development of electronic commerce, many special requirements come into being. In this article, we put forward the concept of group-proxy signature, which integrates the merits of proxy signature and group signature for the first time. We also demonstrate how to apply our scheme to construct an electronic cash system. The space, time, and communication complexities of the relevant parameters and processing procedures are independent of group size. Our demonstration of the concrete group-proxy signature scheme shows that the concepts brought forward by us are sure to elicit much consideration in the future.
引用
收藏
页码:95 / 110
页数:16
相关论文
共 27 条
[1]  
Abe M, 2011, LECT NOTES COMPUT SC, V6841, P649, DOI 10.1007/978-3-642-22792-9_37
[2]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[3]  
Boyen X., 2007, LECT NOTES COMPUT SC, V4450
[4]  
Brickell E., 2008, LECT NOTES COMPUT SC, V4968
[5]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[6]  
Camenisch J., 1998, ADV CRYPTOLOGY ASIAC
[7]  
Camenisch J., 2010, LECT NOTES COMPUT SC, V5479
[8]   A secure identity-based multi-proxy signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) :86-95
[9]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[10]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199