期刊文献+

Provable Security of ID-Based Proxy Multi-Signature Schemes

Provable Security of ID-Based Proxy Multi-Signature Schemes
下载PDF
导出
摘要 In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme. In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期87-90,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60473021) and the Science Foundation of Henan Province (0511010900)
关键词 ID-based signature ID-based proxy multi-signature provable security bilinear pairings. ID-based signature ID-based proxy multi-signature provable security bilinear pairings.
  • 相关文献

参考文献6

  • 1李继国,曹珍富,张亦辰.Nonrepudiable Proxy Multi—Signature Scheme[J].Journal of Computer Science & Technology,2003,18(3):399-402. 被引量:12
  • 2Mambo M,,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[].Proceeding of the Third ACM Conference on Computer and Communications Security.1996
  • 3Boldyreva A,Palacio A,Warinschi B.Secure Proxy Signature Schemes for Delegation of Signing Rights. http://eprint.iacr.org/2003/096 . 2003
  • 4Dutta R,Barua R,Sarkar P.Pairing Based Cryptography: A Survey. .http://eprint.iacr.org/2004/064 . 2004
  • 5Yi L J,,Bai G Q,Xiao G Z.Proxy Multi-Signature Scheme: A New Type of Proxy Signature Scheme[].Electronics Letters.2000
  • 6Malkin T,,Obana S,Yung M.The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures[].Proceeding of Eurocrypto (LNCS.2004

二级参考文献12

  • 1Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528.
  • 2Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197.
  • 3E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472.
  • 4Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253.
  • 5Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354.
  • 8Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197.
  • 9Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232.
  • 10Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部