期刊文献+

A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings 被引量:1

A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings
下载PDF
导出
摘要 ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期193-197,共5页 武汉大学学报(自然科学英文版)
基金 Supported bythe National Key Basic Research andDevelopment Program (973 Program G1999035804),the NationalNatural Science Foundation of China (90204015 ,60473021) and theElitist Youth Foundation of Henan Province (021201400)
关键词 ID-based signatures proxy multi-signature ID-based proxy multi signatures bilinear pairlngs provable security ID-based signatures proxy multi-signature ID-based proxy multi signatures bilinear pairlngs provable security
  • 相关文献

参考文献5

  • 1李继国,曹珍富,张亦辰.Nonrepudiable Proxy Multi—Signature Scheme[J].Journal of Computer Science & Technology,2003,18(3):399-402. 被引量:12
  • 2David Pointcheval,Jacques Stern.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology.2000(3) 被引量:1
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[]..1996 被引量:1
  • 4Yi X.An Identity-Based Signature Scheme From the Weil Pairing[].IEEE Communications Letters.2003 被引量:1
  • 5Yi LJ,Bai G Q,Xiao GZ.Proxy Multi-Signature Scheme : A New Type of Proxy Signature Scheme[].Electronics Letters.2000 被引量:1

二级参考文献12

  • 1Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528. 被引量:1
  • 2Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197. 被引量:1
  • 3E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472. 被引量:1
  • 4Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253. 被引量:1
  • 5Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466. 被引量:1
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57. 被引量:1
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354. 被引量:1
  • 8Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197. 被引量:1
  • 9Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232. 被引量:1
  • 10Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263. 被引量:1

共引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部