Proxy Multi-Signature Scheme in the Standard Model

被引:0
|
作者
Fan, Hai-wei [1 ]
Ming, Yang [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian, Peoples R China
来源
MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8 | 2012年 / 433-440卷
关键词
standard model; proxy multi-signature; provable security; bilinear pairings;
D O I
10.4028/www.scientific.net/AMR.433-440.2077
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Design of proxy multi-signature scheme that is efficient and provably secure in the standard model is suitable for applications. In this paper, we present a formal security model for proxy multi-signature schemes. We also firstly propose a concrete proxy multi-signature scheme based on Waters signature scheme in the standard model. The proposed scheme is proved secure under the computational Diffie-Hellman assumption.
引用
收藏
页码:2077 / 2085
页数:9
相关论文
共 50 条
  • [41] Provably Secure Proxy Multi-Signature Scheme Based on ECC
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 199 - 204
  • [42] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [43] A novel nonrepudiable multi-proxy multi-signature scheme with shared verification
    Qu, J. (qulujuan@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [44] ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    Li, XG
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 437 - 450
  • [45] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [46] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [47] Threshold multi-proxy multi-signature scheme based on bilinear pairings
    Wu, Tzong-Sun
    Lin, Han-Yu
    Shiu, Ming-Je
    WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
  • [48] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
  • [49] An Anonymous Proxy Multi-signature with Accountablility
    Saraswat, Vishal
    Sahu, Rajeev Anand
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 234 - 254
  • [50] Identity based proxy multi-signature
    Wang, Qin
    Cao, Zhenfu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1023 - 1029