×

Certificateless proxy multi-signature. (English) Zbl 1341.94019

Summary: Proxy multi-signature allows a group of original signers to delegate their signing capabilities to a proxy signer in such a way that the proxy signer can sign messages on behalf of the group of original signers. Existing constructions of proxy multi-signatures are based on traditional Public Key Infrastructure or Identity-based Public Key Setting, but the former needs certificates which bring about many certificate management problems, and the latter has a drawback of key escrow. In contrast to the existing constructions, in this paper, we study proxy multi-signature in Certificateless Public Key Cryptography (CL-PKC) which combines the advantages of both certificate-based and identity-based cryptosystems as it avoids the use of certificates and does not suffer from key escrow. We provide the definition and the security model for Certificateless Proxy Multi-Signature (CLPMS), and propose the first CLPMS scheme which is proved to be secure in the random oracle model under the computational Diffie-Hellman assumption. Our scheme is computationally efficient and has the property that the size of a proxy multi-signature is independent of the number of the original signers.

MSC:

94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Al-Riyami, S.; Paterson, K. G., Certificateless public key cryptography, (Proceedings of ASIACRYPT 2003. Proceedings of ASIACRYPT 2003, LNCS, vol. 2894 (2003), Springer-Verlag), 452-473 · Zbl 1205.94072
[2] Cao, F.; Cao, Z., A secure identity-based proxy multi-signature scheme, Inform. Sci. (2008)
[3] Choi, K. Y.; Park, J. H.; Hwang, J. Y.; Lee, D. H., Efficient certificateless signature schemes, (ACNS 2007. ACNS 2007, LNCS, vol. 4521 (2007), Springer-Verlag: Springer-Verlag Berlin Heidelberg), 443-458 · Zbl 1214.94062
[4] Huang, X.; Mu, Y.; Susilo, W.; Wong, D. S.; Wu, W., Certificateless signature revisited, (ACISP 2007. ACISP 2007, LNCS, vol. 4586 (2007), Springer-Verlag), 308-322 · Zbl 1213.94158
[5] Hu, B. C.; Wong, Duncan S.; Zhang, Z.; Deng, X., Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptogr., 42, 109-126 (2007) · Zbl 1148.94009
[6] Hsu, C.; Wu, T.; He, W., New proxy multi-signature scheme, Appl. Math. Comput., 162, 3, 1201-1206 (2005) · Zbl 1061.94055
[7] Ji, J.; Li, D., A new proxy multi-signature scheme, J. Comput. Res. Develop., 41, 4, 715-719 (2004)
[10] Li, X.; Chen, K., ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Appl. Math. Comput., 169, 1, 437-450 (2005) · Zbl 1076.94030
[11] Li, X.; Chen, K.; Li, S., Multi-proxy signature and proxy multi-signature schemes from bilinear pairings, (Liew, K. M., Proceedings of the PDCAT 2004. Proceedings of the PDCAT 2004, LNCS, vol. 3320 (2004), Springer-Verlag), 591-595
[12] Libert, B.; Quisquater, J. J., On constructing certificateless cryptosystems from identity based encryption, (Yung, M.; etal., PKC 2006. PKC 2006, LNCS, vol. 3958 (2006), Springer-Verlag), 474-490 · Zbl 1151.94540
[13] Mambo, M.; Usuda, K.; Okamoto, E., Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fund. Electron. Commun. Comput. Sci., E79-A, 9, 1338-1354 (1996)
[16] Wang, Q.; Cao, Z., Identity-based multi-signature, J. Syst. Softw., 80, 1023-1029 (2007)
[17] Yi, L.; Bai, G.; Xiao, G., Proxy multi-signature scheme: a new type of proxy signature scheme, Electron. Lett., 36, 6, 527-528 (2000)
[18] Zhang, Z.; Wong, Duncan S.; Xu, J.; Feng, D., Certificateless public-key signature: security model and efficient construction, (ACNS 2006. ACNS 2006, LNCS, vol. 3989 (2006), Springer-Verlag), 293-308 · Zbl 1151.94638
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.