ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

被引:35
|
作者
Li, XG [1 ]
Chen, KF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.amc.2004.10.046
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy signatures can combine other special signatures to obtain some new types of proxy signatures. Due to the various applications of the bilinear pairings in cryptography, many identity based signature schemes have been proposed. In this paper, we propose an identity based multi-proxy signature scheme and in identity based proxy multi-signature scheme from bilinear pairings. Both of them can be regarded as a special case of corresponding variants of identify based threshold signature scheme. Based oil these two schemes, we propose an identity based multi-proxy multi-signature scheme. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:437 / 450
页数:14
相关论文
共 50 条
  • [1] Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
    Li, XX
    Chen, KF
    Li, SQ
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 591 - 595
  • [2] Threshold multi-proxy multi-signature scheme based on bilinear pairings
    Wu, Tzong-Sun
    Lin, Han-Yu
    Shiu, Ming-Je
    WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
  • [3] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [4] New multi-proxy multi-signature schemes
    Hwang, SJ
    Chen, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (01) : 57 - 67
  • [5] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93
  • [6] Efficient Multi-proxy Multi-Signature Schemes Based on DLP
    Chang, Ya-Fen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 152 - 159
  • [7] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [8] Nonrepudiable multi-proxy multi-signature scheme
    Xue, QS
    Cao, ZF
    SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 102 - 105
  • [9] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [10] A Multi-proxy Multi-signature Scheme with Different Proxy Groups
    Liu, Danni
    Wang, Lijuan
    Wu, Dongdong
    Wei, Honglei
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1414 - 1418