Filters








7,732 Hits in 5.4 sec

Designated-Verifier Proxy Signature Schemes [chapter]

Guilin Wang
2005 IFIP Advances in Information and Communication Technology  
In both versions, the validity of a proxy signature can be checked only by the designated verifier.  ...  In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former.  ...  Basic Proxy Signature Scheme In this section, we propose a new proxy signature scheme.  ... 
doi:10.1007/0-387-25660-1_27 fatcat:qd3rwdmujvgyhout3h6xsaydxm

Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme [article]

Sunder Lal, Vandani Verma
2009 arXiv   pre-print
In our scheme, the designated verifier can only validate proxy signatures created by a group of proxy signer.  ...  This paper presents a new identity based strong designated verifier parallel multi-proxy signature scheme.  ...  In the proposed scheme, the designated verifier can only verify the multi-proxy signature generated by a group of proxy signers and he cannot convince any third party about the validity of the signatures  ... 
arXiv:0904.3420v1 fatcat:bhyrradd6fbk3mgb77fymaciz4

A Multi-proxy Signature Scheme for Partial delegation with Warrant [article]

Amit K Awasthi, Sunder Lal
2005 arXiv   pre-print
The proxy signature scheme that achieves such purpose is called the multi-proxy signature scheme and the signature generated by the specified proxy group is called multi-proxy signature for the original  ...  In some cases, the original signer may delegate its signing power to a specified proxy group while ensuring individual accountability of each participantsigner.  ...  Proxy signer can sign any message on behalf of whole group. Further, Hwang et al, in 2001, introduced a new proxy multi-signature scheme.  ... 
arXiv:cs/0504093v1 fatcat:cbiaoe7vanbmvh32x6plelte6y

A New ID-based Designated Verifier Proxy Multi-Signature Scheme

Shenjun Cui, Fengtong Wen
2011 Journal of clean energy technologies  
Proxy multi-signature allows a proxy signer to generate signatures on behalf of a group of original signers.  ...  In this paper, we give the model of ID-based designated verifier proxy multi-signature and present a new ID-based designated verifier proxy multisignature scheme.  ...  ACKNOWLEDGMENT The authors would like to thank the Natural Science Foundation of shandong province (No.Y2008A29), the Science and Technique Foundation of shandong province  ... 
doi:10.7763/ijcte.2011.v3.315 fatcat:f7ombodrxreqrgfqealhdnmzwy

A New Threshold Proxy Signature Scheme with Fast Revocation

Mohammad Beheshti Atashgah, Mahmoud Gardeshi, Majid Bayat
2012 International Journal of Computer and Electrical Engineering  
In this paper, we try to solve the fast revocation issue of the threshold proxy signature schemes and propose a new threshold proxy signature scheme with fast revocation that solve the fast revocation  ...  , but or less of the proxy signers cannot generate a proxy signature.  ...  A New Threshold Proxy Signature Scheme with Fast Revocation Mohammad Beheshti-Atashgah, Mahmoud Gardeshi, and Majid Bayat : The original signers group includes signers.  ... 
doi:10.7763/ijcee.2012.v4.602 fatcat:zmwlt5uax5axxl3zblrsusvwhe

An Identity-Based Directed Proxy Multi-Signature Scheme [chapter]

Weiping Zuo
2020 Frontiers in Artificial Intelligence and Applications  
This paper presents a new directed proxy multi-signature scheme, which integrated the directed signature and proxy multi-signature.  ...  In the proposed scheme, the agent generate a signature on behalf of the delegators, only a receiver specified by the delegator convince whether the truth of signature or not.  ...  Motivated with the above, we present a new concrete directed scheme which integrated the directed signature and proxy multi-signature.  ... 
doi:10.3233/faia200813 fatcat:gpee4psbqbfuzgz4ns2ukhkmae

Identity-based strong designated verifier signature schemes: Attacks and new construction

Baoyuan Kang, Colin Boyd, Ed Dawson
2009 Computers & electrical engineering  
As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.  ...  A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the  ...  ID-based designated verifier proxy signature scheme As a direct corollary of our ID-based designated verifier signature scheme, we give a new ID-based designated verifier proxy signature scheme.  ... 
doi:10.1016/j.compeleceng.2008.05.004 fatcat:hjzb2pkchjdaxdnrxikuvwplcu

Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification

Samaneh Mashhadi
2012 Scientia Iranica. International Journal of Science and Technology  
That is, after intercepting a valid proxy signature, an adversary can change the original signers to himself, and forge a proxy signature. To remedy this weakness, we will propose a new method.  ...  KEYWORDS Proxy signature; Threshold proxy signature; Threshold multi-proxy multi-signature scheme; Non-repudiation.  ...  A valid proxy signature can be generated by a subset of the proxy signers delegated by the original signer group for a designated group of verifiers.  ... 
doi:10.1016/j.scient.2011.09.019 fatcat:vsox6spjo5hanjb5nsodnbhnei

A New Proxy Ring Signature Scheme [article]

Amit K. Awasthi, Sunder Lal
2004 arXiv   pre-print
In this paper we introduce a new proxy ring signature scheme.  ...  This signature is considered to be a simplified group signature from which identity of signer is ambiguous although verifier knows the group to which signer belong.  ...  In this paper, we propose a new proxy ring signature scheme based on Lin-Wu's [9] ID-based ring signature scheme from bilinear pairing.  ... 
arXiv:cs/0410010v1 fatcat:xrcncisjujdhjk6v525ea2idj4

Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

Raman Kumar, Nonika Singla
2014 Mathematical Problems in Engineering  
Many of the signature schemes are proposed in which thetout ofnthreshold schemes are deployed, but they still lack the property of security.  ...  We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes.  ...  Acknowledgment The authors also wish to thank many anonymous referees for their suggestions to improve this paper.  ... 
doi:10.1155/2014/429271 fatcat:7t3ba24uvzccppnirrk344gcxe

Fair signature exchange via delegation on ubiquitous networks

Q. Shi, N. Zhang, M. Merabti
2015 Journal of computer and system sciences (Print)  
This approach is then applied to design a new exchange protocol. An analysis of the protocol is also provided to confirm its security and fairness.  ...  This paper addresses the issue of autonomous fair signature exchange in emerging ubiquitous (u-) commerce systems, which require that the exchange task be delegated to authorised devices for its autonomous  ...  Acknowledgement We would like to thank the paper reviewers for their valuable suggestions, which have led to improvements to the paper.  ... 
doi:10.1016/j.jcss.2014.11.001 fatcat:bdqtfbyawzen3m7jad4s26a5ji

Provably Secure Proxy Multi-Signature Scheme Based on ECC

N. Tiwari, S. Padhye, D. He
2014 Information Technology and Control  
Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure.  ...  Having motivated, we first define a formal security model and then propose a provable secure proxy multi-signature scheme based on ECC without pairings.  ...  Acknowledgments The authors are grateful to the Editor and anonymous reviewers for their valuable comments and suggestions for improving an earlier version of the paper.  ... 
doi:10.5755/j01.itc.43.2.5377 fatcat:kolr4ttldzfknj25dnfsndy2ly

Cryptanalysis of pitfalls of a Proxy Signature Scheme over Braid Groups

2019 jecet  
Since that presentation, various new schemes and their improvements have been introduced. Verma also proposed a proxy signature scheme over braid groups.  ...  In the real world, transfer/delegation of powers is a common practice. To realized the delegation of powers in electronic world, Mambo, Usuda and Okamoto proposed the first proxy signature scheme.  ...  A Proxy signature scheme should satisfy the following basic security requirements 1.1 Security Requirements: The security requirements for a secure proxy signature schemes are specified in 2 , which are  ... 
doi:10.24214/jecet.c.8.3.15158 fatcat:67cqeycvgje7jnsr3tf2vgkwki

Proxy and Threshold One-Time Signatures [chapter]

Mohamed Al-Ibrahim, Anton Cerny
2003 Lecture Notes in Computer Science  
In this paper, we try to contribute to filling this gap by introducing several group-based one-time signature schemes of various versions: with proxy, with trusted party, and without trusted party.  ...  Their particular properties make them suitable, as a potential cryptographic primitive, for broadcast communication and group-based applications.  ...  A Class of One-Time Signature Schemes In this section, we establish a model for one-time signature schemes. The model is not aimed at introducing a new kind of signature.  ... 
doi:10.1007/978-3-540-45203-4_10 fatcat:rzeimrnx5bhnlodfhfmxednasy

A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication

Sharavanan Thanasekkaran, Balasubramanian V
2011 International Journal of Computer Applications  
In this paper we propose a threshold digital signature scheme by using RSA cryptography to authenticate multimedia content.  ...  In this scheme any t or more group members can cooperatively generate the group signature where t-1 or fewer cannot do it. This scheme is also secure against conspiracy attack.  ...  For convenience the group members can be dynamically added and removed from the group. If a new member joins the group he will be provided with a new share with his ID.  ... 
doi:10.5120/2450-2548 fatcat:xcm7eqt3t5edjhnamoj4aq7lsm
« Previous Showing results 1 — 15 out of 7,732 results