Proxy Multi-Signature Scheme in the Standard Model

Article Preview

Abstract:

Design of proxy multi-signature scheme that is efficient and provably secure in the standard model is suitable for applications. In this paper, we present a formal security model for proxy multi-signature schemes. We also firstly propose a concrete proxy multi-signature scheme based on Waters signature scheme in the standard model. The proposed scheme is proved secure under the computational Diffie-Hellman assumption.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

2077-2085

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mambo M., Usuda K., Okamoto E. Proxy signature for delegating signing operation. Proceedings of the 3. th ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48~57.

DOI: 10.1145/238168.238185

Google Scholar

[2] Boldyreva A., Palacio A., Warinschi B. Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, available at http: /eprint. iacr. org/2003/096.

DOI: 10.1007/s00145-010-9082-x

Google Scholar

[3] Huang X., Mu Y., Susilo W., et al. A short proxy signature scheme: efficient authentication in the ubiquitous world. UISW2005, LNCS 3823, Berlin: Springer-Verlage, 2005, 480~489.

DOI: 10.1007/11596042_50

Google Scholar

[4] Lee B., Kim H., Kim K. Strong proxy signature and its applications. In Proc of SCIS2001, Vol. 2/2, 2001, 603~608.

Google Scholar

[5] Yi L., Bai G., Xiao G. Proxy multi-signature scheme: a new type of proxy signature schemes. Electronics Letters, 2000, 36(6): 527~528.

DOI: 10.1049/el:20000422

Google Scholar

[6] Hsu Chien-Lung, Wu Tzong-Son, He Wei-HUa. New proxy multi-signature scheme. Applied Mathematics and Computation, 162 (2005): 1201~1206.

DOI: 10.1016/j.amc.2004.03.001

Google Scholar

[7] WANG Qin and CAO Zhenfu. Formal model of proxy multi-signature and a construction. CHINESE JOURNAL OF COMPUTERS. 2006, 29(9): 1628~1635.

Google Scholar

[8] Cao feng and Cao Zhenfu. Security model of proxy-multi signature schemes. In: CANS 2006, LNCS 4301, Berlin: Springer-Verlage, 2006, 144~152.

DOI: 10.1007/11935070_9

Google Scholar

[9] Waters B. Efficient identity-based encryption without random oracles. In: Eurocrypt 2005 , LNCS 3494 , Berlin : Springer-Verlag, 2005, 114~127.

DOI: 10.1007/11426639_7

Google Scholar