首页 | 本学科首页   官方微博 | 高级检索  
     

Provable Security of ID-Based Proxy Multi-Signature Schemes
引用本文:GU Chunxiang ZHU Yuefei ZHAO Tao. Provable Security of ID-Based Proxy Multi-Signature Schemes[J]. 武汉大学学报:自然科学英文版, 2007, 12(1): 87-90. DOI: 10.1007/s11859-006-0206-y
作者姓名:GU Chunxiang ZHU Yuefei ZHAO Tao
作者单位:Institute of Information Engineering, InformationEngineering University, Zhengzhou 450002, Henan, China
基金项目:Foundation item: Supported by the National Natural Science Foundation of China (60473021) and the Science Foundation of Henan Province (0511010900)
摘    要:In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.

关 键 词:计算机 安全保密 信号管理 双线性
文章编号:1007-1202(2007)01-0087-04
收稿时间:2006-05-20

Provable security of ID-based proxy multi-signature schemes
Gu Chunxiang,Zhu Yuefei,Zhao Tao. Provable security of ID-based proxy multi-signature schemes[J]. Wuhan University Journal of Natural Sciences, 2007, 12(1): 87-90. DOI: 10.1007/s11859-006-0206-y
Authors:Gu Chunxiang  Zhu Yuefei  Zhao Tao
Affiliation:(1) Institute of Information Engineering, Information Engineering University, Zhengzhou, 450002, Henan, China
Abstract:In the last couple of years, ID-based cryptography has got fruitful achievements. Proxy multi-signature allows a desig- nated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.
Keywords:ID-based signature   ID-based proxy multi-signature   provable security   bilinear pairings.
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号