A Proxy Multi-Signature Scheme with Forward-Secure

被引:0
作者
Liang, Xiang-Qian [1 ]
Zhang, Yun [1 ]
Zhang, Yong-Hua [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Informat & Comp Sci, Qingdao, Shandong, Peoples R China
来源
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY | 2012年
关键词
forward security; proxy multi-signature; bilinear mapping; computational Diffie-Hellman problem(CDHP); hierarchical ID-based signature(HIBS);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proxy multi-signature scheme allow a proxy signer to represent a group of users to sign a document. Like most of digital signature schemes, its security wholly depends on the security of secret keys. Once secret keys are exposed, all preciously assigned signatures must be reissued. Forward-secure signatures are used to address this problem, in which all previously generated signatures are still considered to be valid even after secret keys are compromised. In this paper, by borrowing the idea of hierarchical ID-based signature (HIBS), we integrated forward security into the proxy multi-signature scheme and proposed a proxy multi-signature scheme with forward-secure which supports the efficient batch verification of several signatures of the same message under different public keys. The security of our scheme relies on the hardness of computational Diffie-Hellman problem(CDHP) and Hash function.
引用
收藏
页码:794 / 798
页数:5
相关论文
共 12 条
[1]  
Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
[2]  
Anderson R., 1997, P ACM CCS 97
[3]  
[Anonymous], NEW FORWARD SECURE S
[4]  
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
[5]   Forward-secure multisignature and blind signature schemes [J].
Chow, SSM ;
Hui, LCK ;
Yiu, SM ;
Chow, KP .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) :895-908
[6]  
Gentry C., 2002, LECT NOTES COMPUTER, V2501
[7]  
Itkis G., 2001, P CRYPT, V2139, P499
[8]  
Krawczyk H., 2000, P 7 ACM C COMP COMM, P108, DOI DOI 10.1145/352600.352617
[9]  
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[10]  
Sun Hung-Min., 1999, P 9 NATL C INFORM SE, P241