Efficient certificateless sequential multi-signature scheme

被引:2
|
作者
Qin, Yan-Lin [1 ]
Wu, Xiao-Ping [1 ]
机构
[1] Department of Information Security, Naval University of Engineering, Wuhan 430033, China
来源
关键词
Problem solving - Public key cryptography;
D O I
10.3969/j.issn.1000-436x.2013.07.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication of recommendation information transmitted through trust train is important for trust model in distributed environment. To solve this problem, the security model for the certificateless sequential multi-signature scheme was studied and then a certificateless sequential multi-signature scheme using elliptic curve cryptography and bilinear pairings was proposed. It is proven in the random oracle that the security of the scheme is based on the fact that the computational Diffie-Hellman problem is hard. Meanwhile, the scheme needs no certificate management center and the length of signature is independent of the number of signers. It needs no bilinear pairing operation in the phase of partial signing, and just needs one each in verification phases of partial signing and integral signing. So it is computationally efficient compared to the existing signature schemes and can be applied conveniently to trust transitivity in large scale distributed environment.
引用
收藏
页码:105 / 110
相关论文
共 50 条
  • [31] New proxy multi-signature scheme
    Ji, Jia-Hui
    Li, Da-Xing
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 715 - 719
  • [32] Nonrepudiable proxy multi-signature scheme
    JiGuo Li
    ZhenFu Cao
    YiChen Zhang
    Journal of Computer Science and Technology, 2003, 18 : 399 - 402
  • [33] The Convertible Undeniable Multi-Signature Scheme
    Yun, SungHyun
    Lee, Hyung-Woo
    Lee, MyungHo
    ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 805 - +
  • [34] Cryptanalysis on a proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 117 - +
  • [35] Nonrepudiable proxy multi-signature scheme
    Li, JG
    Cao, ZF
    Zhang, YC
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (03) : 399 - 402
  • [36] An Efficient Post-quantum Multi-signature Scheme for the Internet of Vehicles
    Zhang, Qianyi
    Yuan, Shuai
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2504 - 2509
  • [37] Security Analysis and The Improvement of the sequential multi-signature scheme based on discrete logarithm
    Zhang, Xinghua
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 581 - 584
  • [39] A New Proxy Multi-Signature Scheme
    Xiong, Jiang Guan
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 20 - 23
  • [40] An efficient certificateless multi-proxy signature scheme without pairing
    Qu, Yunyun
    Deng, Lunzhi
    Bao, Xiaomin
    Huang, Huawei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (02) : 148 - 163