Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Formalized Security Model of Multi-Proxy Signature Schemes
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Certificateless multi-proxy signature
Computer Communications
Provably secure multi-proxy signature scheme with revocation in the standard model
Computer Communications
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
On provably secure code-based multiple grade proxy signature scheme
International Journal of High Performance Systems Architecture
Hi-index | 0.00 |
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Plenty of multi-proxy signature schemes have been proposed under the certificate-based public key systems. Due to the various applications of the bilinear pairings in cryptography, many identity-based signature schemes have been proposed. In this paper, we give the first formal definition and security model of an identity-based multi-proxy signature scheme, then propose an identity-based multi-proxy signature scheme from bilinear pairings and prove its security in our security model.