Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Formalized Security Model of Multi-Proxy Signature Schemes
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
True random number generator based on mouse movement and chaotic hash function
Information Sciences: an International Journal
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences: an International Journal
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
An ID-based proxy multi signature scheme without bilinear pairings
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
One-time proxy signature based on quantum cryptography
Quantum Information Processing
A Secure Integrated Medical Information System
Journal of Medical Systems
Security and Communication Networks
A novel anonymous proxy signature scheme
Advances in Multimedia
On provably secure code-based multiple grade proxy signature scheme
International Journal of High Performance Systems Architecture
Hi-index | 0.07 |
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. To our best knowledge, most of existing proxy multi-signature schemes are proposed in public key infrastructure setting, which may be the bottleneck due to its complexity. To deduce the complexity, several proxy multi-signature schemes are proposed in the ID-based setting. However, no formal definitions on ID-based proxy are proposed until now. To fill the gap, this paper proposes the formal definition. Furthermore, we present a proven secure ID-based proxy multi-signature scheme, which is more efficient than existing schemes in term of computational cost.