GU Ke, JIA Weijia, DENG Yueming, NIE Xiaoyi. Secure and Efficient Multi-proxy Signature Scheme in the Standard Model[J]. Chinese Journal of Electronics, 2016, 25(1): 93-99. doi: 10.1049/cje.2016.01.015
Citation: GU Ke, JIA Weijia, DENG Yueming, NIE Xiaoyi. Secure and Efficient Multi-proxy Signature Scheme in the Standard Model[J]. Chinese Journal of Electronics, 2016, 25(1): 93-99. doi: 10.1049/cje.2016.01.015

Secure and Efficient Multi-proxy Signature Scheme in the Standard Model

doi: 10.1049/cje.2016.01.015
Funds:  This work is supported by the National Natural Science Foundation of China (No.61402055, No.61462048), Hunan Provincial Natural Science Foundation of China (No.13JJ6031), and Scientific Research Project of Hunan Provincial Education Department (No.15C0041, No.13B132, No.15A007, No.15C0779).
  • Received Date: 2014-01-10
  • Rev Recd Date: 2014-08-09
  • Publish Date: 2016-01-10
  • Multi-proxy signature is a variant of proxy signature, which allows that a delegator may delegate his signing rights to many proxy signers. Compared with proxy signature, multi-proxy signature can effectively prevent that some of proxy signers abuse signing rights. In this paper, we propose an efficient multi-proxy signature scheme in the standard model, which is based on the Waters' signature scheme. Compared with other multi-proxy signature schemes in the standard model, the proposed scheme further reduces the amount of computations and communications.
  • loading
  • M. Mambo, K. Usuda and E. Okamoto, “Proxy signature: Delegation of the power to sign messages”, IEICE Trans. on Fundamentals of Electronics Communication and Computer Science, Vol.E79-A, No.9, pp.1338-1354, 1996.
    T. Malkin, S. Obana and M. Yung, “The hierarchy of key evolving signatures and a characterization of proxy signatures”, Proc. of Advances in Cryptology-EUROCRYPT, Santa Barbara, California, USA, pp.306-322, 2004.
    Y. Sun, C.X. Xu, Y. Yu, et al., “Strongly unforgeable proxy signature scheme secure in the standard model”, Journal of Systems and Software, Vol.84, No.9, pp.1471-1479, 2011.
    N. Tiwari and S. Padhye, “Provable secure proxy signature scheme without bilinear pairings”, International Journal of Communication Systems, Vol.26, No.5, pp.644-650, 2013.
    F. Cao and Z.F. Cao, “A secure identity-based multi-proxy signature scheme”, Computers and Electrical Engineering, Vol.35, No.1, pp.86-95, 2009.
    G. Fuchsbauer and D. Pointcheval, “Anonymous consecutive delegation of signing rights: Unifying group and proxy signatures”, Formal to Practical Security, Vol.5458, pp.95-115, 2009.
    J. Herranz and G. Saez, “Revisiting fully distributed proxy signature schemes”, http://eprint.iacr.org/2003/197, 2003-9-1.
    Z.P. Jin and Q.Y. Wen, “Certificateless multi-proxy signature”, Computer Communications, Vol.34, No.3, pp.344-352, 2011.
    Z.H. Liu, Y.P. Hu, X.S. Zhang, et al., “Provably secure multiproxy signature scheme with revocation in the standard model”, Computer Communications, Vol.34, No.3, pp.494-501, 2011.
    Y. Sun, C.X. Xu, H. Wang, et al., “Improved multi-proxy signature scheme without random oracles”, Chinese Journal of Electronics, Vol.20, No.2, pp.200-206, 2011.
    Q. Wang, Z.F. Cao and S.B. Wang, “Formalized security model of multi-proxy signature schemes”, Proc. of the Fifth International Conference on Computer and Information Technology, Shanghai, China, pp.668-672, 2005.
    H. Xiong, J.B. Hu, Z. Chen, et al., “On the security of an identity based multi-proxy signature scheme”, Computers and Electrical Engineering, Vol.37, No.2, pp.129-135, 2011.
    F. Cao and Z. Cao, “A secure identity-based proxy multisignature scheme”, Information Sciences, Vol.179, No.5, pp.292-302, 2009.
    X. Li and K. Chen, “ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings”, Applied Mathematics and Computation, Vol.169, No.1, pp.437-450, 2005.
    Y. Sun, C.X. Xu, Y. Yu, et al., “Improvement of a proxy multisignature scheme without random oracles”, Computer Communications, Vol.34, No.3, pp.257-263, 2011.
    Z.H. Shao, “Improvement of identity-based proxy multisignature scheme”, Journal of Systems and Software, Vol.82, No.5, pp.794-800, 2009.
    Y.S. Kim and J.H. Chang, “Provably secure proxy blind signature scheme”, Proc. of the Eighth IEEE International Symposium on Multimedia, San Diego, California, USA, pp.998-1003, 2006.
    S. Lal and A.K. Awasthi, “Proxy blind signature scheme”, http://eprint.iacr.org/2003/072, 2003-7-1.
    S.J. Hwang and C.C. Chen, “New threshold-proxy thresholdsignature schemes”, Computers and Electrical Engineering, Vol.31, No.1, pp.69-80, 2005.
    H.F. Huang and C.C. Chang, “A novel efficient (t, n) threshold proxy signature scheme”, Information Sciences, Vol.176, No.10, pp.1338-1349, 2006.
    J.H. Hu and J.Z. Zhang, “Cryptanalysis and improvement of a threshold proxy signature scheme”, Computer Standards and Interfaces, Vol.31, No.1, pp.169-173, 2009.
    R.X. Lu, Z.F. Cao and H.J. Zhu, “A robust (k, n)+1 threshold proxy signature scheme based on factoring”, Applied Mathematics and Computation, Vol.166, No.1, pp.35-45, 2005.
    C.H. Yang, S.F. Tzeng and M.S. Hwang, “On the efficiency of non-repudiable threshold proxy signature scheme with known signers”, Journal of Systems and Software, Vol.73, No.3, pp.507-514, 2004.
    A. Boldyreva, A. Palacio and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights”, http://eprint.iacr.org/2003/096, 2003-6-1.
    A. Boldyreva, A. Palacio and B.Warinschi, “Secure proxy signature schemes for delegation of signing rights”, Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
    K. Gu, W.J. Jia, R.Y. Chen, et al., “Secure and efficient proxy signature scheme in the standard model”, Chinese Journal of Electronics, Vol.22, No.4, pp.666-670, 2013.
    K.G. Paterson and J.C.N. Schuldt, “Efficient identity-based signatures secure in the standard model”, Proc. of ACISP2006, Melbourne, Australia, pp.207-222, 2006.
    B. Waters, “Efficient identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, Aarhus, Denma, pp.114-127, 2005.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (215) PDF downloads(490) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return