Affiliation:
1. Nanjing University of Aeronautics and Astronautics
Abstract
Privacy has become one of the most important human rights of the modern age. In a proxy multi-signature scheme, the verifier need get all the original signers’ public keys together to verify its validity. However, the relationships between the proxy signer and the original signers would be leaked in the verification process. In this paper, we propose a secure proxy multi-signature scheme in standard model with the property of independent verification. In the scheme, the verifier can verify the signature using the public keys of the special original signers, rather than collecting all the original signers’ public keys.
Publisher
Trans Tech Publications, Ltd.
Reference20 articles.
1. Mambo M., Usuda K. and Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science. Vol. E79-A No. 9 (1996), p.1338–1354.
2. Hsu Chien-Lung, Wu Tzong-Sun and Wu Tzong-Chen. New nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software. Vol. 58 (2001), pp.119-124.
3. Yang Cheng-Ying, Zeng Shiang-Feng and Hwang Min-Shiang. On the efficiency of nonrepudiable threshold proxy signaturescheme with known signers. The Journal of Systems and Software. Vol. 73 (2004), p.507–514.
4. Shao Jun, Cao Zhenfu and Lu Rongxing. Improvement of Yang et al. 's threshold proxy signature scheme. The Journal of Systems and Software. Vol. 80 (2007), p.172–177.
5. Yi L., Bai G., Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters. vol. 36 (6) (2000), p.527–528.