2011
DOI: 10.1007/978-3-642-24586-2_9
|View full text |Cite
|
Sign up to set email alerts
|

An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…In this study, first we show that identity-based proxy multi-signature [33] and multiproxy multi-signature [37] are not secure in their security models. Then, we propose the first identity-based multi-proxy multi-signature scheme from RSA, without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are special cases of it.…”
Section: Introductionmentioning
confidence: 89%
See 4 more Smart Citations
“…In this study, first we show that identity-based proxy multi-signature [33] and multiproxy multi-signature [37] are not secure in their security models. Then, we propose the first identity-based multi-proxy multi-signature scheme from RSA, without bilinear pairings, where identity-based multi-proxy signature and proxy multi-signature schemes are special cases of it.…”
Section: Introductionmentioning
confidence: 89%
“…Since the notion of proxy signatures has been introduced, several variants of proxy signatures have been proposed. These include proxy signatures from RSA and integer factorization problem [2][3][4][5][6][7], identity-based proxy signature schemes based on the bilinear pairings [8][9][10][11][12][13][14][15], designated verifier proxy signatures [16][17][18], short proxy signatures [19], proxy verifiably encrypted signatures [20], proxy signature schemes without random oracles [21], multi-proxy signatures [22][23][24], proxy multi-signatures [23], multi-proxy multi-signatures [25,26], identity-based multi-proxy signatures [13,[27][28][29], identity-based proxy multi-signatures [28,[30][31][32][33] and identity-based multi-proxy multi-signature schemes [28,[34][35][36][37]. In this study, we focus on identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations