Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2012, Article ID 427961, 10 pages
http://dx.doi.org/10.1155/2012/427961
Research Article

A Novel Anonymous Proxy Signature Scheme

Department of Information Management, Nanhua University, Chiayi 622, Taiwan

Received 30 April 2012; Accepted 18 July 2012

Academic Editor: Joonki Paik

Copyright © 2012 Jue-Sam Chou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signature: delegation of the power to sign messages,” IEICE—Transactions on Fundamentals of Electronics, vol. E79-A, no. 9, pp. 1338–1354, 1996. View at Google Scholar
  2. R. Lu, Z. Cao, and Y. Zhou, “Proxy blind multi-signature scheme without a secure channel,” Applied Mathematics and Computation, vol. 164, no. 1, pp. 179–187, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. H. F. Huang and C. C. Chang, “A novel efficient (t, n) threshold proxy signature scheme,” Information Sciences, vol. 176, no. 10, pp. 1338–1349, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Kang, C. Boyd, and E. Dawson, “Identity-based strong designated verifier signature schemes: attacks and new construction,” Computers and Electrical Engineering, vol. 35, no. 1, pp. 49–53, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. K. L. Wu, J. Zou, X. H. Wei, and F. Y. Liu, “Proxy group signature: a new anonymous proxy signature scheme,” in Proceedings of the 7th International Conference on Machine Learning and Cybernetics (ICMLC'08), pp. 1369–1373, Kunming, China, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. Z. Shao, “Improvement of identity-based proxy multi-signature scheme,” The Journal of Systems and Software, vol. 82, no. 5, pp. 794–800, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. H. Liu, Y. P. Hu, X. S. Zhang, and H. Ma, “Secure proxy signature scheme with fast revocation in the standard model,” Journal of China Universities of Posts and Telecommunications, vol. 16, no. 4, pp. 116–124, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Yu, C. Xu, X. Huang, and Y. Mu, “An efficient anonymous proxy signature scheme with provable security,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 348–353, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. F. Cao and Z. Cao, “A secure identity-based proxy multi-signature scheme,” Information Sciences, vol. 179, no. 3, pp. 292–302, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Yang and W. P. Peng, “A modified anonymous proxy signature with a trusted party,” in Proceedings of the 1st International Workshop on Education Technology and Computer Science (ETCS'09), pp. 233–236, Wuhan, China, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. J. H. Hu and J. Zhang, “Cryptanalysis and improvement of a threshold proxy signature scheme,” Computer Standards and Interfaces, vol. 31, no. 1, pp. 169–173, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Yu, C. X. Xu, X. S. Zhang, and Y. J. Liao, “Designated verifier proxy signature scheme without random oracles,” Computers and Mathematics with Applications, vol. 57, no. 8, pp. 1352–1364, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. J. H. Zhang, C. L. Liu, and Y. I. Yang, “An efficient secure proxy verifiably encrypted signature scheme,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 29–34, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. B. D. Wei, F. G. Zhang, and X. F. Chen, “ID-based ring proxy signatures,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT'07), pp. 1031–1035, Nice, France, June 2007. View at Publisher · View at Google Scholar
  15. T. S. Wu and H. Y. Lin, “Efficient self-certified proxy CAE scheme and its variants,” The Journal of Systems and Software, vol. 82, no. 6, pp. 974–980, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Lal and V. Verma, “Identity based Bi-designated verifier proxy signature schemes,” Cryptography Eprint Archive Report 394, 2008. View at Google Scholar
  17. S. Lal and V. Verma, “Identity based strong designated verifier proxy signature schemes,” Cryptography Eprint Archive Report 394, 2006. View at Google Scholar
  18. C. Y. Yang, S. F. Tzeng, and M. S. Hwang, “On the efficiency of nonrepudiable threshold proxy signature scheme with known signers,” The Journal of Systems and Software, vol. 73, no. 3, pp. 507–514, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Xiong, J. Hu, Z. Chen, and F. Li, “On the security of an identity based multi-proxy signature scheme,” Computers and Electrical Engineering, vol. 37, no. 2, pp. 129–135, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Sun, C. Xu, Y. Yu, and Y. Mu, “Strongly unforgeable proxy signature scheme secure in the standard model,” The Journal of Systems and Software, vol. 84, no. 9, pp. 1471–1479, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Sun, C. Xu, Y. Yu, and B. Yang, “Improvement of a proxy multi-signature scheme without random oracles,” Computer Communications, vol. 34, no. 3, pp. 257–263, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. Z. Liu, Y. Hu, X. Zhang, and H. Ma, “Provably secure multi-proxy signature scheme with revocation in the standard model,” Computer Communications, vol. 34, no. 3, pp. 494–501, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Bao, Z. Cao, and S. Wang, “Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification,” Applied Mathematics and Computation, vol. 169, no. 2, pp. 1419–1430, 2005. View at Publisher · View at Google Scholar · View at Scopus
  24. J. G. Li and Z. F. Cao, “Improvement of a threshold proxy signature scheme,” Computer Research and Development, vol. 39, no. 11, pp. 1513–1518, 2002. View at Google Scholar · View at Scopus
  25. Y. Yu, Y. Mu, W. Susilo, Y. Sun, and Y. Ji, “Provably secure proxy signature scheme from factorization,” Mathematical and Computer Modelling, vol. 55, no. 3-4, pp. 1160–1168, 2012. View at Publisher · View at Google Scholar
  26. K. Shum and V. K. Wei, “A strong proxy signature scheme with proxy signer privacy protection,” in Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), pp. 55–56, Pittsburgh, Pa, USA, 2002. View at Publisher · View at Google Scholar
  27. N. Y. Lee and M. F. Lee, “The security of a strong proxy signature scheme with proxy signer privacy protection,” Applied Mathematics and Computation, vol. 161, no. 3, pp. 807–812, 2005. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Saeednia, “An identity-based society oriented signature scheme with anonymous signers,” Information Processing Letters, vol. 83, no. 6, pp. 295–299, 2002. View at Publisher · View at Google Scholar · View at Scopus
  29. C. L. Hsu, T. S. Wu, and T. C. Wu, “Group-oriented signature scheme with distinguished signing authorities,” Future Generation Computer Systems, vol. 20, no. 5, pp. 865–873, 2004. View at Publisher · View at Google Scholar · View at Scopus
  30. C. Y. Lin, T. C. Wu, F. Zhang, and J. J. Hwang, “New identity-based society oriented signature schemes from pairings on elliptic curves,” Applied Mathematics and Computation, vol. 160, no. 1, pp. 245–260, 2005. View at Publisher · View at Google Scholar · View at Scopus
  31. Z. Shao, “Certificate-based verifiably encrypted signatures from pairings,” Information Sciences, vol. 178, no. 10, pp. 2360–2373, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Zhang and J. Mao, “A novel ID-based designated verifier signature scheme,” Information Sciences, vol. 178, no. 3, pp. 766–773, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. F. Chung, Z. Y. Wu, and T. S. Chen, “Ring signature scheme for ECC-based anonymous signcryption,” Computer Standards and Interfaces, vol. 31, no. 4, pp. 669–674, 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology: Proceedings of CRYPTO '82, pp. 199–203, Springer, New York, NY, USA, 1983. View at Google Scholar