An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer journal 2015-04, Vol.58 (4), p.1021-1039
Hauptverfasser: Asaar, Maryam Rajabzadeh, Salmasizadeh, Mahmoud, Susilo, Willy
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1039
container_issue 4
container_start_page 1021
container_title Computer journal
container_volume 58
creator Asaar, Maryam Rajabzadeh
Salmasizadeh, Mahmoud
Susilo, Willy
description The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.
doi_str_mv 10.1093/comjnl/bxu037
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1709779864</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1709779864</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</originalsourceid><addsrcrecordid>eNpdkM1LwzAchoMoOKdH7wEvXup-abqkOW7Dj8HEwfw4hjRNt4w2nUkK239vpZ48ve_h4eXlQeiWwAMBQSe6bfaunhTHDig_QyOSMUhSYPwcjQAIJBlL4RJdhbAHgBQEGyE5c3hZGhdtPCVzFUyJX7s62mTt2-Ppr2_s1qnYeYM3emcag79s3LVdxHNbW2eUx2tlvXXbgJUrsY0BfypvlYvhGl1Uqg7m5i_H6OPp8X3xkqzenpeL2SrRqchjkok81aBTQ0UqKKe54dMSphpSwqGCosw0cGUo5JxWpCCFKaHKgQk1zXKmKjpG98PuwbffnQlRNjZoU9fKmbYLsp8RnIucZT169w_dt513_TtJGAciWE5oTyUDpX0bgjeVPHjbKH-SBOSvbjnoloNu-gM9yHR-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1670196813</pqid></control><display><type>article</type><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</creator><creatorcontrib>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</creatorcontrib><description>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxu037</identifier><identifier>CODEN: CMPJAG</identifier><language>eng</language><publisher>Oxford: Oxford Publishing Limited (England)</publisher><subject>Computer information security ; Computer simulation ; Digital certificates ; Digital signatures ; Management ; Mathematical models ; Proposals ; Public Key Infrastructure ; Signatures</subject><ispartof>Computer journal, 2015-04, Vol.58 (4), p.1021-1039</ispartof><rights>Copyright Oxford Publishing Limited(England) Apr 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Asaar, Maryam Rajabzadeh</creatorcontrib><creatorcontrib>Salmasizadeh, Mahmoud</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><title>Computer journal</title><description>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</description><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Digital certificates</subject><subject>Digital signatures</subject><subject>Management</subject><subject>Mathematical models</subject><subject>Proposals</subject><subject>Public Key Infrastructure</subject><subject>Signatures</subject><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpdkM1LwzAchoMoOKdH7wEvXup-abqkOW7Dj8HEwfw4hjRNt4w2nUkK239vpZ48ve_h4eXlQeiWwAMBQSe6bfaunhTHDig_QyOSMUhSYPwcjQAIJBlL4RJdhbAHgBQEGyE5c3hZGhdtPCVzFUyJX7s62mTt2-Ppr2_s1qnYeYM3emcag79s3LVdxHNbW2eUx2tlvXXbgJUrsY0BfypvlYvhGl1Uqg7m5i_H6OPp8X3xkqzenpeL2SrRqchjkok81aBTQ0UqKKe54dMSphpSwqGCosw0cGUo5JxWpCCFKaHKgQk1zXKmKjpG98PuwbffnQlRNjZoU9fKmbYLsp8RnIucZT169w_dt513_TtJGAciWE5oTyUDpX0bgjeVPHjbKH-SBOSvbjnoloNu-gM9yHR-</recordid><startdate>20150401</startdate><enddate>20150401</enddate><creator>Asaar, Maryam Rajabzadeh</creator><creator>Salmasizadeh, Mahmoud</creator><creator>Susilo, Willy</creator><general>Oxford Publishing Limited (England)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150401</creationdate><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><author>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Digital certificates</topic><topic>Digital signatures</topic><topic>Management</topic><topic>Mathematical models</topic><topic>Proposals</topic><topic>Public Key Infrastructure</topic><topic>Signatures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Asaar, Maryam Rajabzadeh</creatorcontrib><creatorcontrib>Salmasizadeh, Mahmoud</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Asaar, Maryam Rajabzadeh</au><au>Salmasizadeh, Mahmoud</au><au>Susilo, Willy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</atitle><jtitle>Computer journal</jtitle><date>2015-04-01</date><risdate>2015</risdate><volume>58</volume><issue>4</issue><spage>1021</spage><epage>1039</epage><pages>1021-1039</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><coden>CMPJAG</coden><abstract>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</abstract><cop>Oxford</cop><pub>Oxford Publishing Limited (England)</pub><doi>10.1093/comjnl/bxu037</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0010-4620
ispartof Computer journal, 2015-04, Vol.58 (4), p.1021-1039
issn 0010-4620
1460-2067
language eng
recordid cdi_proquest_miscellaneous_1709779864
source Oxford University Press Journals All Titles (1996-Current)
subjects Computer information security
Computer simulation
Digital certificates
Digital signatures
Management
Mathematical models
Proposals
Public Key Infrastructure
Signatures
title An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T02%3A40%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Identity-Based%20Multi-Proxy%20Multi-Signature%20Scheme%20Without%20Bilinear%20Pairings%20and%20its%20Variants&rft.jtitle=Computer%20journal&rft.au=Asaar,%20Maryam%20Rajabzadeh&rft.date=2015-04-01&rft.volume=58&rft.issue=4&rft.spage=1021&rft.epage=1039&rft.pages=1021-1039&rft.issn=0010-4620&rft.eissn=1460-2067&rft.coden=CMPJAG&rft_id=info:doi/10.1093/comjnl/bxu037&rft_dat=%3Cproquest_cross%3E1709779864%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1670196813&rft_id=info:pmid/&rfr_iscdi=true