New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
A Proposal of Short Proxy Signature using Pairing
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Security model of proxy-multi signature schemes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
Provably secure multi-proxy signature scheme with revocation in the standard model
Computer Communications
Hi-index | 0.00 |
In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy multi-signature schemes allow a proxy signer to generate a proxy signature on behalf of two or more original signers. However, the security of the known proxy multi-signature schemes is proven in the random oracle which does not imply security in the real world. In this paper, we present a proxy multi-signature scheme in the standard model. The size of a proxy multi-signature is independent of the number of the original signers. Our scheme is existentially unforgeable against chosen message attack and chosen warrant attack based on the hardness of the well known CDH problem in the standard model.