ICICS '97 Proceedings of the First International Conference on Information and Communication Security
The random oracle methodology, revisited
Journal of the ACM (JACM)
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
Secure Proxy Multi-signature Scheme in the Standard Model
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
How Risky Is the Random-Oracle Model?
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
A mediated proxy signature scheme with fast revocation for electronic transactions
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A novel anonymous proxy signature scheme
Advances in Multimedia
Hi-index | 0.24 |
Multi-proxy signature schemes are very useful tools when an original signer needs to delegate his signing capability to a group of proxy signers, and have been suggested in numerous applications. The proxy revocation problem is an essential issue of the proxy signature schemes, however, it is seldom considered in the multi-proxy signature schemes. In this paper, we give a formal definition and security model of the multi-proxy signature schemes with proxy revocation, and propose a multi-proxy signature scheme with proxy revocation. Our scheme can perform the immediate revocation by using a security mediator (SEM), who examines whether each proxy signer signs according to a warrant or its identity exists in a revocation list, and then decides if it issues a proxy token for each proxy signer. The proposed scheme is proven existentially unforgeable against chosen message/warrant attacks based on the computational Diffie-Hellman intractability assumption in the standard model. Furthermore, the size of a multi-proxy signature is constant and independent of the number of the proxy signers.