ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

被引:35
|
作者
Li, XG [1 ]
Chen, KF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.amc.2004.10.046
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy signatures can combine other special signatures to obtain some new types of proxy signatures. Due to the various applications of the bilinear pairings in cryptography, many identity based signature schemes have been proposed. In this paper, we propose an identity based multi-proxy signature scheme and in identity based proxy multi-signature scheme from bilinear pairings. Both of them can be regarded as a special case of corresponding variants of identify based threshold signature scheme. Based oil these two schemes, we propose an identity based multi-proxy multi-signature scheme. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:437 / 450
页数:14
相关论文
共 50 条
  • [21] Improvement of a Multi-proxy Multi-signature Scheme in the Standard Model
    Fan, Haiwei
    Zhao, Xiangmo
    Ming, Yang
    Du, Jin
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4737 - 4742
  • [22] A non-repudiable multi-proxy multi-signature scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ICIC Express Letters, 2009, 3 (03): : 259 - 263
  • [23] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    J. Comput. Inf. Syst., 2009, 5 (1375-1380):
  • [24] Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
    Lyuu, YD
    Wu, ML
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 729 - 739
  • [25] Multi-proxy multi-signature without pairing from certificateless cryptography
    School of Mathematical Sciences, Xiamen University, China
    不详
    不详
    不详
    不详
    Int. J. Netw. Secur., 3 (403-413):
  • [26] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [27] A novel nonrepudiable multi-proxy multi-signature scheme with shared verification
    Qu, J. (qulujuan@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [28] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
  • [29] A new multi-proxy multi-signature scheme based on elliptic curve cryptography
    Dang Minh Tuan
    Nguyen Anh Viet
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109
  • [30] ID-Based multi-proxy sequential signature system from bilinear pairing
    Xu Guo-Sheng
    Yang Yi-Xian
    Gu Li-Ze
    Niu Xin-Xin
    PROCEEDING OF THE 2007 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS, 2007, : 315 - 318