Formalized security model of identity-based multi-proxy signature

Multi-proxy signature is an extension of the basic proxy signature primitive. In a multi-proxy signature scheme, an original signer could delegate his signing rights to a group of proxy signers. And only the cooperation of all the proxy signers can generate the proxy signature on behalf of the original signer. Combining multi-proxy signature with identity-based cryptography, some identity-based multi-proxy signature schemes have been proposed. But to date, no formalized security model has been provided for identity-based multi-proxy signature schemes. In this paper, the authors give the formal definition of identity-based multi-proxy signature schemes and formalize a notion of security for them.

[1]  Shen Wei,et al.  Automatic Annotation Method of Textual Coherence Semantic Relationship , 2012 .

[2]  Sunder Lal,et al.  ID based generalized signcryption , 2008, IACR Cryptol. ePrint Arch..

[3]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[4]  Umit Atila,et al.  A genetic algorithm approach for finding the shortest driving time on mobile devices , 2011 .

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Satoshi Obana,et al.  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.

[7]  Sunder Lal,et al.  Efficient Generalized Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..

[8]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[9]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[10]  Tang Chun-ming Forward-secure multiple proxy signature scheme with proxy revocation , 2011 .

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Wang Yong-bing Threshold Hybrid Proxy Multi-signature Scheme , 2012 .

[13]  Gang Yu,et al.  Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..

[14]  Kefei Chen,et al.  ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..

[15]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[16]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[17]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[18]  Liu Wenyuan Efficient pairing-based and identity-based generalized signcryption scheme , 2010 .

[19]  Kwangjo Kim,et al.  ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .