An ID-Based Proxy Multi-Signature Scheme

Article Preview

Abstract:

Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to the same other entity. Combining proxy multi-signature with identity based cryptography, in this paper, We construct a concrete identity based proxy multi-signature scheme by using bilinear pairings. Analysis shows that the scheme is capable of resisting forgery attack and can satisfy all the required security properties of a proxy signature. Furthermore, the new scheme is very simple and efficient computationally. It has the property that the size of a proxy multi-signature is independent of the number of the original signers.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

217-221

Citation:

Online since:

October 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Shamir, Identity-based cryptosystems and signature schemes, in: G.R. Blakley, D. Chaum (Eds. ), Proceedings of the Crypto'84, LNCS, vol. 196, Springer- Verlag, 1984, p.47–53.

Google Scholar

[2] D. Boneh, M. Franklin, Identity-based Encryption from the Weil pairing, SIAM Journal of Computing 32 (3) (2003) 586–615. Extended abstract in Advances in Crptology- Crypto'01, LNCS 2139, Berlin, Springer-Verlag, 2001, p.213–229.

DOI: 10.1137/s0097539701398521

Google Scholar

[3] F. Cao, Z.F. Cao, A secure identity-based multi-proxy signature scheme, Computers and Electrical Engineering, 35 (1) (2009) 86–95.

DOI: 10.1016/j.compeleceng.2008.05.005

Google Scholar

[4] B. Libert, J.J. Quisquater, The exact security of an identity based signature and its applications, Cryptology e Print Archive: Report 2004/102.

Google Scholar

[5] Mambo Masahiro, Keisude Usuda, Eiji Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fundament. E79-A (9) (1996) 1338–1354.

Google Scholar

[6] Fu Xiaotong, Xiao Guozhen. A new type of proxy multi-signature schemes Journal of Xidian University 2001, 28(6): 729-731.

Google Scholar

[7] C. Gentry,Z. Ramzan,Identity-based aggregate signatures. PKC 2006, LNCS 3958, 257–273.

DOI: 10.1007/11745853_17

Google Scholar

[8] HSU C, WU T, HE W. New proxy multi-signature scheme [J]. Applied Mathematics and Computation, 2005, 162(3): 1201-1206.

DOI: 10.1016/j.amc.2004.03.001

Google Scholar

[9] Ji, Jiahui, Li,D. A new proxy multi-signature scheme. Journal of Computer Research and Development . 41 (4), 2004, 715-719.

Google Scholar

[10] S.J. Hwang, C.H. Shi, A simple multi-proxy signature scheme for electronic commerce, in: Proceedings of the 10th National Conference on Information Security, Hualien Taiwan, 2000, 134-138.

Google Scholar