An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates....
Gespeichert in:
Veröffentlicht in: | Computer journal 2015-04, Vol.58 (4), p.1021-1039 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1039 |
---|---|
container_issue | 4 |
container_start_page | 1021 |
container_title | Computer journal |
container_volume | 58 |
creator | Asaar, Maryam Rajabzadeh Salmasizadeh, Mahmoud Susilo, Willy |
description | The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption. |
doi_str_mv | 10.1093/comjnl/bxu037 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1709779864</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1709779864</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</originalsourceid><addsrcrecordid>eNpdkM1LwzAchoMoOKdH7wEvXup-abqkOW7Dj8HEwfw4hjRNt4w2nUkK239vpZ48ve_h4eXlQeiWwAMBQSe6bfaunhTHDig_QyOSMUhSYPwcjQAIJBlL4RJdhbAHgBQEGyE5c3hZGhdtPCVzFUyJX7s62mTt2-Ppr2_s1qnYeYM3emcag79s3LVdxHNbW2eUx2tlvXXbgJUrsY0BfypvlYvhGl1Uqg7m5i_H6OPp8X3xkqzenpeL2SrRqchjkok81aBTQ0UqKKe54dMSphpSwqGCosw0cGUo5JxWpCCFKaHKgQk1zXKmKjpG98PuwbffnQlRNjZoU9fKmbYLsp8RnIucZT169w_dt513_TtJGAciWE5oTyUDpX0bgjeVPHjbKH-SBOSvbjnoloNu-gM9yHR-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1670196813</pqid></control><display><type>article</type><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</creator><creatorcontrib>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</creatorcontrib><description>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxu037</identifier><identifier>CODEN: CMPJAG</identifier><language>eng</language><publisher>Oxford: Oxford Publishing Limited (England)</publisher><subject>Computer information security ; Computer simulation ; Digital certificates ; Digital signatures ; Management ; Mathematical models ; Proposals ; Public Key Infrastructure ; Signatures</subject><ispartof>Computer journal, 2015-04, Vol.58 (4), p.1021-1039</ispartof><rights>Copyright Oxford Publishing Limited(England) Apr 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Asaar, Maryam Rajabzadeh</creatorcontrib><creatorcontrib>Salmasizadeh, Mahmoud</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><title>Computer journal</title><description>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</description><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Digital certificates</subject><subject>Digital signatures</subject><subject>Management</subject><subject>Mathematical models</subject><subject>Proposals</subject><subject>Public Key Infrastructure</subject><subject>Signatures</subject><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpdkM1LwzAchoMoOKdH7wEvXup-abqkOW7Dj8HEwfw4hjRNt4w2nUkK239vpZ48ve_h4eXlQeiWwAMBQSe6bfaunhTHDig_QyOSMUhSYPwcjQAIJBlL4RJdhbAHgBQEGyE5c3hZGhdtPCVzFUyJX7s62mTt2-Ppr2_s1qnYeYM3emcag79s3LVdxHNbW2eUx2tlvXXbgJUrsY0BfypvlYvhGl1Uqg7m5i_H6OPp8X3xkqzenpeL2SrRqchjkok81aBTQ0UqKKe54dMSphpSwqGCosw0cGUo5JxWpCCFKaHKgQk1zXKmKjpG98PuwbffnQlRNjZoU9fKmbYLsp8RnIucZT169w_dt513_TtJGAciWE5oTyUDpX0bgjeVPHjbKH-SBOSvbjnoloNu-gM9yHR-</recordid><startdate>20150401</startdate><enddate>20150401</enddate><creator>Asaar, Maryam Rajabzadeh</creator><creator>Salmasizadeh, Mahmoud</creator><creator>Susilo, Willy</creator><general>Oxford Publishing Limited (England)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150401</creationdate><title>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</title><author>Asaar, Maryam Rajabzadeh ; Salmasizadeh, Mahmoud ; Susilo, Willy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-4982c0c2e39293738e75d05c02170f0bd4c07ae30873f1b1bed0f8069a5486af3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Digital certificates</topic><topic>Digital signatures</topic><topic>Management</topic><topic>Mathematical models</topic><topic>Proposals</topic><topic>Public Key Infrastructure</topic><topic>Signatures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Asaar, Maryam Rajabzadeh</creatorcontrib><creatorcontrib>Salmasizadeh, Mahmoud</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Asaar, Maryam Rajabzadeh</au><au>Salmasizadeh, Mahmoud</au><au>Susilo, Willy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants</atitle><jtitle>Computer journal</jtitle><date>2015-04-01</date><risdate>2015</risdate><volume>58</volume><issue>4</issue><spage>1021</spage><epage>1039</epage><pages>1021-1039</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><coden>CMPJAG</coden><abstract>The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they are insecure in their security models. Secondly, we propose an identity-based multi-proxy multi-signature scheme without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are its special cases. Then, we prove that they are secure under Rivest, Shamir and Adleman (RSA) assumption in the random oracle model by presenting a new Forking Lemma. The proposal and its special cases are the first identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature from RSA assumption.</abstract><cop>Oxford</cop><pub>Oxford Publishing Limited (England)</pub><doi>10.1093/comjnl/bxu037</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0010-4620 |
ispartof | Computer journal, 2015-04, Vol.58 (4), p.1021-1039 |
issn | 0010-4620 1460-2067 |
language | eng |
recordid | cdi_proquest_miscellaneous_1709779864 |
source | Oxford University Press Journals All Titles (1996-Current) |
subjects | Computer information security Computer simulation Digital certificates Digital signatures Management Mathematical models Proposals Public Key Infrastructure Signatures |
title | An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T02%3A40%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Identity-Based%20Multi-Proxy%20Multi-Signature%20Scheme%20Without%20Bilinear%20Pairings%20and%20its%20Variants&rft.jtitle=Computer%20journal&rft.au=Asaar,%20Maryam%20Rajabzadeh&rft.date=2015-04-01&rft.volume=58&rft.issue=4&rft.spage=1021&rft.epage=1039&rft.pages=1021-1039&rft.issn=0010-4620&rft.eissn=1460-2067&rft.coden=CMPJAG&rft_id=info:doi/10.1093/comjnl/bxu037&rft_dat=%3Cproquest_cross%3E1709779864%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1670196813&rft_id=info:pmid/&rfr_iscdi=true |