An Anonymous but Accountable Proxy Multi-signature Scheme

نویسندگان

  • He Du
  • Jian Wang
چکیده

in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Using the technology of pseudonym and secret sharing, in this paper, a simple method was proposed to reach the target of anonymous but accountable. In the scheme, the identity of the proxy signer was anonymous, but when t or more original signers want to reveal the proxy signer's identity, the proxy signer’s identity would be revealed and be demonstrated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Anonymous but Accountable Secure Proxy Signature Scheme

Privacy has become one of the most important human rights of the modern age. In order to verify the validity of the proxy signature, the verifier need get the original signers’ public key and the proxy signer’s public key. Obviously, the verification would leak the relationship between the proxy signer and the original signer. Using the technology of pseudonym, in this paper, we propose a simpl...

متن کامل

An Efficient Secure Anonymous Proxy Signature Scheme

Proxy signature schemes can be used in many business applications such as when the original signer is not present to sign important documents. Any proxy signature scheme has to meet the identifiability, undeniability, verifiability and unforgeability security requirements. In some conditions, it may be necessary to protect the proxy signer’s privacy from outsiders or third parties. Recently, se...

متن کامل

A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation

Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of...

متن کامل

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only s...

متن کامل

Security Analysis of a Threshold Proxy Signature Scheme

The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013