Citation: | GU Ke, JIA Weijia, DENG Yueming, et al., “Secure and Efficient Multi-proxy Signature Scheme in the Standard Model,” Chinese Journal of Electronics, vol. 25, no. 1, pp. 93-99, 2016, doi: 10.1049/cje.2016.01.015 |
M. Mambo, K. Usuda and E. Okamoto, “Proxy signature: Delegation of the power to sign messages”, IEICE Trans. on Fundamentals of Electronics Communication and Computer Science, Vol.E79-A, No.9, pp.1338-1354, 1996.
|
T. Malkin, S. Obana and M. Yung, “The hierarchy of key evolving signatures and a characterization of proxy signatures”, Proc. of Advances in Cryptology-EUROCRYPT, Santa Barbara, California, USA, pp.306-322, 2004.
|
Y. Sun, C.X. Xu, Y. Yu, et al., “Strongly unforgeable proxy signature scheme secure in the standard model”, Journal of Systems and Software, Vol.84, No.9, pp.1471-1479, 2011.
|
N. Tiwari and S. Padhye, “Provable secure proxy signature scheme without bilinear pairings”, International Journal of Communication Systems, Vol.26, No.5, pp.644-650, 2013.
|
F. Cao and Z.F. Cao, “A secure identity-based multi-proxy signature scheme”, Computers and Electrical Engineering, Vol.35, No.1, pp.86-95, 2009.
|
G. Fuchsbauer and D. Pointcheval, “Anonymous consecutive delegation of signing rights: Unifying group and proxy signatures”, Formal to Practical Security, Vol.5458, pp.95-115, 2009.
|
J. Herranz and G. Saez, “Revisiting fully distributed proxy signature schemes”, http://eprint.iacr.org/2003/197, 2003-9-1.
|
Z.P. Jin and Q.Y. Wen, “Certificateless multi-proxy signature”, Computer Communications, Vol.34, No.3, pp.344-352, 2011.
|
Z.H. Liu, Y.P. Hu, X.S. Zhang, et al., “Provably secure multiproxy signature scheme with revocation in the standard model”, Computer Communications, Vol.34, No.3, pp.494-501, 2011.
|
Y. Sun, C.X. Xu, H. Wang, et al., “Improved multi-proxy signature scheme without random oracles”, Chinese Journal of Electronics, Vol.20, No.2, pp.200-206, 2011.
|
Q. Wang, Z.F. Cao and S.B. Wang, “Formalized security model of multi-proxy signature schemes”, Proc. of the Fifth International Conference on Computer and Information Technology, Shanghai, China, pp.668-672, 2005.
|
H. Xiong, J.B. Hu, Z. Chen, et al., “On the security of an identity based multi-proxy signature scheme”, Computers and Electrical Engineering, Vol.37, No.2, pp.129-135, 2011.
|
F. Cao and Z. Cao, “A secure identity-based proxy multisignature scheme”, Information Sciences, Vol.179, No.5, pp.292-302, 2009.
|
X. Li and K. Chen, “ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings”, Applied Mathematics and Computation, Vol.169, No.1, pp.437-450, 2005.
|
Y. Sun, C.X. Xu, Y. Yu, et al., “Improvement of a proxy multisignature scheme without random oracles”, Computer Communications, Vol.34, No.3, pp.257-263, 2011.
|
Z.H. Shao, “Improvement of identity-based proxy multisignature scheme”, Journal of Systems and Software, Vol.82, No.5, pp.794-800, 2009.
|
Y.S. Kim and J.H. Chang, “Provably secure proxy blind signature scheme”, Proc. of the Eighth IEEE International Symposium on Multimedia, San Diego, California, USA, pp.998-1003, 2006.
|
S. Lal and A.K. Awasthi, “Proxy blind signature scheme”, http://eprint.iacr.org/2003/072, 2003-7-1.
|
S.J. Hwang and C.C. Chen, “New threshold-proxy thresholdsignature schemes”, Computers and Electrical Engineering, Vol.31, No.1, pp.69-80, 2005.
|
H.F. Huang and C.C. Chang, “A novel efficient (t, n) threshold proxy signature scheme”, Information Sciences, Vol.176, No.10, pp.1338-1349, 2006.
|
J.H. Hu and J.Z. Zhang, “Cryptanalysis and improvement of a threshold proxy signature scheme”, Computer Standards and Interfaces, Vol.31, No.1, pp.169-173, 2009.
|
R.X. Lu, Z.F. Cao and H.J. Zhu, “A robust (k, n)+1 threshold proxy signature scheme based on factoring”, Applied Mathematics and Computation, Vol.166, No.1, pp.35-45, 2005.
|
C.H. Yang, S.F. Tzeng and M.S. Hwang, “On the efficiency of non-repudiable threshold proxy signature scheme with known signers”, Journal of Systems and Software, Vol.73, No.3, pp.507-514, 2004.
|
A. Boldyreva, A. Palacio and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights”, http://eprint.iacr.org/2003/096, 2003-6-1.
|
A. Boldyreva, A. Palacio and B.Warinschi, “Secure proxy signature schemes for delegation of signing rights”, Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
|
K. Gu, W.J. Jia, R.Y. Chen, et al., “Secure and efficient proxy signature scheme in the standard model”, Chinese Journal of Electronics, Vol.22, No.4, pp.666-670, 2013.
|
K.G. Paterson and J.C.N. Schuldt, “Efficient identity-based signatures secure in the standard model”, Proc. of ACISP2006, Melbourne, Australia, pp.207-222, 2006.
|
B. Waters, “Efficient identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, Aarhus, Denma, pp.114-127, 2005.
|