Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
نویسندگان
چکیده
Multi-proxy signature (MPS) scheme makes a very important branch of the proxy signature scheme family, as they are applicable in many practical situations. The MPS scheme enables the actual signer to pass on their signing authority to plural proxy signers, where each proxy/delegated signer should contribute together to create a genuine MPS to make the whole thing work. In this work, we shall present an efficient MPS scheme that apply self-certified key and the notion of message recovery. The major advantage of our scheme is that the verification of the public keys, the verification of MPS, and recovery of the message can be carried out simultaneously. This reduces the computation cost and communication load dramatically. The security analysis of the proposed scheme includes thorough discussions over the security of the secret keys, the legitimacy of the public key of the signer’s, along with unforgeability of our MPS scheme (MPSS). The performance analysis of our MPSS, reflects that our scheme, has an edge regarding computational complexity, over the schemes given in Wu et al.’s and Xie et al.’s.
منابع مشابه
Self-certified multi-proxy signature schemes with message recovery
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public...
متن کاملImprovement of efficient proxy signature schemes using self-certified public keys
Elaborating on the merits of self-certified public key systems and message recovery signature schemes, this paper proposed a proxy signature scheme based on discrete logarithms and its variant based on elliptic curve discrete logarithms. The proposed schemes are efficient in the terms of communication overheads and computational efforts due to the following reasons: (i) The signing message is u...
متن کاملA Threshold Proxy Signature Scheme Using Self-Certified Public Keys
A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t−1 or less of them cannot do the same thing. Threshold proxy signatures have been suggested for use in the scenarios of distributed computing where delegation of rights is qui...
متن کاملCryptanalysis of A Self-Certified Threshold Proxy Signature Scheme Ased on Elliptic Curve Discrete Logarithm Problem
Digital signatures based on self-certified public key systems are more efficient because the authentication of the users’ public keys can be implicitly accomplished with the signature verification. In 2009, Xue et al. proposed first self-certified threshold proxy signature scheme based on the elliptic curve discrete logarithm problem (ECDLP). In this paper, we show that Xue et al.’s scheme can ...
متن کاملNew Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in e-cash and e-commerce. In this paper, we present a verifiable self-certified public key scheme and a proxy blind signature scheme using the verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. As far a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017