Paper Title:
An ID-Based Proxy Multi-Signature Scheme
  Abstract

Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to the same other entity. Combining proxy multi-signature with identity based cryptography, in this paper, We construct a concrete identity based proxy multi-signature scheme by using bilinear pairings. Analysis shows that the scheme is capable of resisting forgery attack and can satisfy all the required security properties of a proxy signature. Furthermore, the new scheme is very simple and efficient computationally. It has the property that the size of a proxy multi-signature is independent of the number of the original signers.

  Info
Periodical
Chapter
Chapter 2: Network & Control
Edited by
Robin G. Qiu and Yongfeng Ju
Pages
217-221
DOI
10.4028/www.scientific.net/AMM.135-136.217
Citation
H. Meng, X. Qian, "An ID-Based Proxy Multi-Signature Scheme", Applied Mechanics and Materials, Vols. 135-136, pp. 217-221, 2012
Online since
October 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Da Jian Liao, Yuan Sheng Tang
Abstract:In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter...
753
Authors: Jian Hong Zhang, Min Xu, Xiu Na Su
Abstract:As a concept of delegating signing rights for digital signatures, proxy signature is a well studied subject in cryptography. Proxy signature...
876
Authors: Cheng Yu Hu, Peng Tao Liu
Abstract:The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring...
2192
  | Authors: Xiu Ying Yu, Da Ke He
Chapter 3: Computational Methods for Engineering
Abstract:Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based...
198
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914