Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model

As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of multi-proxy signature. These problems restrict its application since many devices has limited computation capacity and storage space. In this work, a novel multi-proxy signature scheme with short length in the standard model is proposed. The scheme can not only achieve strong unforgeability, but also has short length of the signature. Compared with the other three multi-proxy signature schemes, the proposed scheme has the great advantages over the other three schemes. To the best of our knowledge, our proposed multi-proxy signature scheme is the first shortest size, whose signature length is only 320 bits for a security level of 80 bits and the same length as that of DSA.

[1]  Dan Boneh,et al.  Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups , 2008, Journal of Cryptology.

[2]  Takeshi Okamoto,et al.  Extended Proxy Signatures for Smart Cards , 1999, ISW.

[3]  Jianhong Zhang,et al.  An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..

[4]  Jianhong Zhang,et al.  An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow , 2013, J. Inf. Sci. Eng..

[5]  Pla Information,et al.  New Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings , 2004 .

[6]  Qiaoyan Wen,et al.  Certificateless proxy multi-signature , 2014, Inf. Sci..

[7]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[8]  Jianhong Zhang,et al.  An efficient secure proxy verifiably encrypted signature scheme , 2010, J. Netw. Comput. Appl..

[9]  Yi Mu,et al.  A New Signature Scheme Without Random Oracles from Bilinear Pairings , 2006, VIETCRYPT.

[10]  Jianhong Zhang,et al.  Another Efficient Proxy Signature Scheme in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.

[11]  Jie Xu,et al.  Improved certificateless multi-proxy signature , 2012 .

[12]  Hua Ma,et al.  Secure proxy signature scheme with fast revocation in the standard model , 2009 .

[13]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[14]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[15]  Yi Mu,et al.  Proxy Signature Without Random Oracles , 2006, MSN.

[16]  Yupu Hu,et al.  Provably secure multi-proxy signature scheme with revocation in the standard model , 2011, Comput. Commun..

[17]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[18]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[19]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[20]  Yang Xiaoyuan,et al.  New multi-signature and proxy multi-signature schemes from the Weil pairings , 2004, InfoSecu '04.

[21]  Bo,et al.  Multi-Proxy Signature Without Random Oracles , 2008 .

[22]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[23]  Yupu Hu,et al.  Secure Proxy Multi-signature Scheme in the Standard Model , 2008, ProvSec.

[24]  Robert H. Deng,et al.  Security Analysis of Some Proxy Signatures , 2003, ICISC.

[25]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[26]  Jianhong Zhang,et al.  Short computational Diffie–Hellman‐based proxy signature scheme in the standard model , 2014, Int. J. Commun. Syst..

[27]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[28]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.