Classification of signature-only signature models

We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21141 kinds of signature models can be derived by appropriately combining different general classes. The result comprises almost existing signature models. It will be helpful for exploring new signature models. To the best of our knowledge, it is the first time for investigation of the problem of classification of signature-only signature models.

[1]  Jan Camenisch,et al.  Fair Blind Signatures , 1995, EUROCRYPT.

[2]  Zhang Jian-zhong,et al.  New multi-proxy multi-signature scheme , 2010 .

[3]  Jung Hee Cheon,et al.  A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption , 2003, ICICS.

[4]  Amit K. Awasthi,et al.  ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2005, Int. J. Netw. Secur..

[5]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[6]  Kefei Chen,et al.  ID-based proxy blind signature , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[7]  Dawn Xiaodong Song,et al.  Practical forward secure group signature schemes , 2001, CCS '01.

[8]  Joseph K. Liu,et al.  Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.

[9]  David Chaum,et al.  Designated Confirmer Signatures , 1994, EUROCRYPT.

[10]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[11]  Zhenfu Cao,et al.  Nonrepudiable proxy multi-signature scheme , 2003, Journal of Computer Science and Technology.

[12]  Guilin Wang,et al.  Designated-Verifier Proxy Signature Schemes , 2005, SEC.

[13]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[14]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[15]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[16]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallet with Observers , 2002 .

[17]  Rainer A. Rueppel,et al.  Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[18]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[19]  Juxia Liu,et al.  A Proxy Blind Signature Scheme Based on DLP , 2010, 2010 International Conference on Internet Technology and Applications.

[20]  Pla Information A New Multi-proxy Multi-signature Scheme , 2006 .

[21]  Colin Boyd,et al.  A Provably Secure Restrictive Partially Blind Signature Scheme , 2002, Public Key Cryptography.

[22]  Hyung-Woo Lee,et al.  The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents , 2004, PCM.

[23]  Zulfikar Ramzan,et al.  Group Blind Digital Signatures: A Scalable Solution to Electronic Cash , 1998, Financial Cryptography.

[24]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[25]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[26]  Min-Shiang Hwang,et al.  A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..

[27]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[28]  Xiaofeng Chen,et al.  ID-Based Restrictive Partially Blind Signatures , 2005, CIS.

[29]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[30]  Tzong-Chen Wu,et al.  ID-Based Structured Mulitsignature Schemes , 2001, Network Security.

[31]  Joseph K. Liu,et al.  Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups , 2004, ESAS.

[32]  Jan Camenisch,et al.  Efficient and Generalized Group Signatures , 1997, EUROCRYPT.

[33]  K. Itakura,et al.  A public-key cryptosystem suitable for digital multisignatures , 1983 .

[34]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[35]  Reihaneh Safavi-Naini,et al.  New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..

[36]  Siu-Ming Yiu,et al.  Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.

[37]  Masayuki Abe,et al.  How to Date Blind Signatures , 1996, ASIACRYPT.

[38]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[39]  Kwangjo Kim,et al.  ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .

[40]  Chin-Laung Lei,et al.  Blind Threshold Signatures Based on Discrete Logarithm , 1996, ASIAN.

[41]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[42]  Chin-Laung Lei,et al.  Partially Blind Threshold signatures Based on Discrete Logarithm , 1999, Comput. Commun..

[43]  Xiaofeng Chen,et al.  On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature , 2007, IACR Cryptol. ePrint Arch..

[44]  Joseph K. Liu,et al.  Solutions to Key Exposure Problem in Ring Signature , 2008, Int. J. Netw. Secur..

[45]  Zhang Jian-zhong,et al.  Improved Forward-secure Proxy Signature Scheme , 2007 .

[46]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[47]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[48]  Yi Mu,et al.  Universal Designated Multi Verifier Signature Schemes , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[49]  Dengguo Feng,et al.  Identity Based Threshold Proxy Signature , 2004, IACR Cryptol. ePrint Arch..

[50]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[51]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[52]  Birgit Pfitzmann,et al.  Fail-stop Signatures and their Application , 1991 .

[53]  Siu-Ming Yiu,et al.  Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..