An Ordered Multi-proxy Multi-signature Scheme

Recently, Hwang and Chen proposed a new multi-proxy multi-signature scheme. In this paper, an improvement on Hwang et. al. scheme will be proposed. It is more efficient in terms of computational complexity and communication cost. Furthermore, the security of the new scheme is based on the difficulty of factoring large numbers.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[3]  Zhenfu Cao,et al.  On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification , 2007, Int. J. Netw. Secur..

[4]  Eric Jui-Lin Lu,et al.  Abstract , 2003, Appetite.

[5]  Ashutosh Saxena,et al.  Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[8]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[9]  Pla Information A New Multi-proxy Multi-signature Scheme , 2006 .

[10]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[11]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[12]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[13]  Chin-Chen Chang,et al.  Parallel computation of the generating keys for RSA cryptosystems , 1996 .

[14]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[15]  Yang Liu,et al.  Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme , 2006, Int. J. Netw. Secur..

[16]  Qi Xie,et al.  Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..

[17]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[18]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[19]  Chin-Chen Chang,et al.  A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..

[20]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[21]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.