期刊文献+

Improved certificateless multi-proxy signature 被引量:4

Improved certificateless multi-proxy signature
原文传递
导出
摘要 Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme. Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第4期94-105,116,共13页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (61170270,61100203,60903152,61003286,61121061) the Fundamental Research Funds for the Central Universities (BUPT2011YB01,BUPT2011RC0505,2011PTB-00-29,2011RCZJ15,2012RC0612)
关键词 CERTIFICATELESS multi-proxy signature provable security bilinear map certificateless, multi-proxy signature, provable security, bilinear map
  • 相关文献

参考文献14

  • 1Diffie W, Hellman M E. New directions in cryptography. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 2Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of the 4th Annual International Cryptology Conference (Crypto'84), Aug 19-22, 1984, Santa Barbara, CA, USA. LNCS 196. Berlin, Germany: Springer-Verlag, 1985: 47-53.
  • 3A1-Riyami S, Paterson K. Certificateless public key cryptography. Advances in Cryptology: Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt'03), Nov 30-Dec 4, 2003, Taipei, China. LNCS 2894. Berlin, Germany: Springer-Verlag, 2003:452-473.
  • 4Au M, Chen J, Liu Jet al. Malicious KGC attacks in certificateless cryptography. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS'07), Mar 20-22, 2007, Singapore. New York, NY, USA: ACM, 2007:302-311.
  • 5Huang X, Mu Y, Susilo W, et al. Certificateless signature revisited. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP'07), Jul 2-4, 2007, Townsville, Australia. LNCS 4586. Berlin, Germany: Springer-Verlag, 2007:308-22.
  • 6Liu Z H, Hu Y P, Zhang X S, et al. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452--464.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996, E79-A (9): 1338-1354.
  • 8Zhang K. Threshold proxy signattn'e schemes. Proceedings of the 1st International Information Security Workshop (ISW'97), Sep 17-19, 1997, Tatsunokuchi, Japan. LNCS 1396. Berlin, Germany: Springer-Verlag, 1997: 282-290.
  • 9Pmdhan S, Mohapatra R K, Proxy blind signature based on ECDLP. International Journal of Engineering Science and Technology, 2011, 3(3): 2244-2248.
  • 10Li X X, Chen K F, Li S Q. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. Proceedings of the 5th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'04), Dec 8-10, 2004, Singapore. LNCS 3320. Berlin, Germany: Springer-Verlag, 2005:61-62.

同被引文献31

  • 1康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12
  • 2Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multisignatures[J].NEC Research and Development,1983(71):1-8.
  • 3Jin Zhengping,Wen Qiaoyan.Certificateless multi-proxy signature[J].Computer Communications,2011,34(3):344-352.
  • 4Du Hongzhen,Wen Qiaoyan.Certificateless proxy multi-signature[J].Information Sciences,2014(276):21-30.
  • 5Al-Riyami S S,Paterson K G. Certificateless public keycryptography [ C ] // Advances in Cryptology-ASIACRYPT2003. 2003,2894:452^73.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for del-egating signing operation [ C ]// Proceedings of the 3thACM Conference on Computer and Communications Securi-ty. 1996:48-57.
  • 7Duan Shanshan. Certificateless undeniable signature scheme[J]. Information Sciences,2008,178(3) ;742-755.
  • 8He Debiao,Chen Yitao,Chen Jianhua. An efficient certif-icateless proxy signature scheme without pairing[ J]. Ma-thenatical and Computer Modelling, 2013,57 (9-10):2510-2518.
  • 9Seo Seung-hyun,Choi Kyu-young, Hwang Jung-yeon. Effi-cient certificateless proxy signature scheme with provablesecurity [J]. Information Sciences, 2012,188:322-337.
  • 10Zhang Lei, Zhang Futai, Wu Qianhong. Delegation of sig- ning rights using certificateless proxy signatures [ J ]. Infor- mation Sciences, 2012,184( 1 ) :298-309.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部