期刊文献+

A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings 被引量:1

A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings
在线阅读 下载PDF
导出
摘要 ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期193-197,共5页 武汉大学学报(自然科学英文版)
基金 Supported bythe National Key Basic Research andDevelopment Program (973 Program G1999035804),the NationalNatural Science Foundation of China (90204015 ,60473021) and theElitist Youth Foundation of Henan Province (021201400)
关键词 ID-based signatures proxy multi-signature ID-based proxy multi signatures bilinear pairlngs provable security ID-based signatures proxy multi-signature ID-based proxy multi signatures bilinear pairlngs provable security
  • 相关文献

参考文献5

  • 1李继国,曹珍富,张亦辰.Nonrepudiable Proxy Multi—Signature Scheme[J].Journal of Computer Science & Technology,2003,18(3):399-402. 被引量:12
  • 2David Pointcheval,Jacques Stern.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology.2000(3)
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[]..1996
  • 4Yi X.An Identity-Based Signature Scheme From the Weil Pairing[].IEEE Communications Letters.2003
  • 5Yi LJ,Bai G Q,Xiao GZ.Proxy Multi-Signature Scheme : A New Type of Proxy Signature Scheme[].Electronics Letters.2000

二级参考文献12

  • 1Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528.
  • 2Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197.
  • 3E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472.
  • 4Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253.
  • 5Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354.
  • 8Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197.
  • 9Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232.
  • 10Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263.

共引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部