Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Gu, Kea; *; † | Jia, Weijiab | Zhang, Jianmingc
Affiliations: [a] School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, 410114, China. [email protected] | [b] School of Information Science and Engineering, Central South University, Changsha, 410083, China | [c] School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, 410114, China
Correspondence: [†] Address for correspondence: School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, 410114, China.
Note: [*] This work is supported by the National Natural Science Foundation of China (No. 61402055, No. 61462048) and the Scientific Research Project of Hunan Provincial Education Department (No. 15C0041, No. 15A007, No. 15C0779).
Abstract: Multi-proxy signature is a variant of proxy signature, which allows that a delegator (original signer) may delegate his signing rights to many proxy signers. Comparing with proxy signatures, multi-proxy signatures can effectively prevent that some of proxy signers abuse signing rights. Also, with the rapid development of identity-based cryptography, identity-based multi-proxy signature (IBMPS) schemes have been proposed. Comparing with proxy signature based on public key cryptography, IBMPS can simplify key management and be used for more applications. Presently, many identity-based multi-proxy signature schemes have been proposed, but most of them are constructed in the random oracle model. Also, the existing security model for identity-based multi-proxy signature is not enough complete according to the Boldyreva et al.’s work. In this paper, we present a framework for IBMPS on n + 1 users (n is the number of proxy signers participating in signing), and show a detailed security model for IBMPS. Under our framework, we present an identity-based multi-proxy signature scheme in the standard model. Comparing with other identity-based multi-proxy signature schemes, the proposed scheme has more complete security.
Keywords: multi-proxy signature, identity-based cryptography, identity-based multi-proxy signature, security model
DOI: 10.3233/FI-2017-1464
Journal: Fundamenta Informaticae, vol. 150, no. 2, pp. 179-210, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]