An Anonymous but Accountable Proxy Multi-signature Scheme
نویسندگان
چکیده
in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Using the technology of pseudonym and secret sharing, in this paper, a simple method was proposed to reach the target of anonymous but accountable. In the scheme, the identity of the proxy signer was anonymous, but when t or more original signers want to reveal the proxy signer's identity, the proxy signer’s identity would be revealed and be demonstrated.
منابع مشابه
A New Anonymous but Accountable Secure Proxy Signature Scheme
Privacy has become one of the most important human rights of the modern age. In order to verify the validity of the proxy signature, the verifier need get the original signers’ public key and the proxy signer’s public key. Obviously, the verification would leak the relationship between the proxy signer and the original signer. Using the technology of pseudonym, in this paper, we propose a simpl...
متن کاملAn Efficient Secure Anonymous Proxy Signature Scheme
Proxy signature schemes can be used in many business applications such as when the original signer is not present to sign important documents. Any proxy signature scheme has to meet the identifiability, undeniability, verifiability and unforgeability security requirements. In some conditions, it may be necessary to protect the proxy signer’s privacy from outsiders or third parties. Recently, se...
متن کاملA Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of...
متن کاملAnonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only s...
متن کاملSecurity Analysis of a Threshold Proxy Signature Scheme
The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 8 شماره
صفحات -
تاریخ انتشار 2013