Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 827320, 11 pages
http://dx.doi.org/10.1155/2015/827320
Research Article

Attribute Based Multisignature Scheme for Wireless Communications

1School of Telecommunications Engineering, Xidian University, Xi’an, Shaanxi 710071, China
2School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798
3School of Computer Science and Technology, Xidian University, Xi’an, Shaanxi 710071, China
4Faculty of Software, Fujian Normal University, Fuzhou, Fujian 350108, China

Received 29 August 2014; Accepted 1 September 2014

Academic Editor: David Taniar

Copyright © 2015 Ximeng Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Week, “Adobe says 2.9 m customers at risk after hacking,” 2013, http://www.theweek.co.uk/technology/55448/adobe-says-29m-customers-risk-after-hacking.
  2. S. Shahandashti and R. Safavi-Naini, “Threshold attribute-based signatures and their application to anonymous credential systems,” in Progress in Cryptology—AFRICACRYPT 2009, pp. 198–216, 2009. View at Publisher · View at Google Scholar
  3. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  4. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, ACM, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. X. A. Wang, X. Yang, M. Zhang, and Y. Yu, “Cryptanalysis of a fuzzy identity based encryption scheme in the standard model,” Informatica, vol. 23, no. 2, pp. 299–314, 2012. View at Google Scholar · View at MathSciNet
  6. P. Yang, Z. Cao, and X. Dong, “Fuzzy identity based signature,” IACR Cryptology ePrint Archive Report 2008/002, 2008. View at Google Scholar
  7. S. F. Shahandashti and R. Safavi-Naini, “Threshold attribute-based signatures and their application to anonymous credential systems,” Report 2009/126, ACR Cryptology ePrint Archive, 2009. View at Google Scholar
  8. H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures: achieving attribute-privacy and collusionresistance,” in IACR Cryptology ePrint Archive, p. 328, 2008. View at Google Scholar
  9. J. Li and K. Kim, “Hidden attribute-based signatures without anonymity revocation,” Information Sciences, vol. 180, no. 9, pp. 1681–1689, 2010. View at Google Scholar · View at MathSciNet · View at Scopus
  10. J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute-based signature and its applications,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS '10), pp. 60–69, ACM, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Cao, B. Zhao, X. Wang, and J. Su, “Flexible multi-authority attribute-based signature schemes for expressive policy,” Mobile Information Systems, vol. 8, no. 3, pp. 255–274, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Itakura and K. Nakamura, “A public-key cryptosystem suitable for digital multisignatures,” NEC Research and Development, vol. 71, pp. 1–8, 1983. View at Google Scholar · View at Scopus
  13. T. Okamoto, “A digital multisignature scheme using bijective public-key cryptosystems,” ACM Transactions on Computer Systems, vol. 6, no. 4, pp. 432–441, 1988. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Ohta and T. Okamoto, “A digital multisignature scheme based on the Fiat-Shamir scheme,” in Advances in Cryptology—ASIACRYPT '91, vol. 739 of Lecture Notes in Computer Science, pp. 139–148, Springer, Berlin, Germany, 1993. View at Publisher · View at Google Scholar
  15. T. Okamoto, “Multi-signature schemes secure against active insider attacks,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 82, no. 1, pp. 21–31, 1999. View at Google Scholar · View at Scopus
  16. S. Micali, K. Ohta, and L. Reyzin, “Accountable-subgroup multisignatures,” in Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS ’01), pp. 245–254, Philadelphia, Pa, USA, November 2001. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Boldyreva, “Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme,” in Public Key Cryptography—PKC 2003: Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003, vol. 2567 of Lecture Notes in Computer Science, pp. 31–46, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  18. S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, “Sequential aggregate signatures and multisignatures without random oracles,” in Advances in Cryptology-EUROCRYPT, pp. 465–485, 2006. View at Google Scholar
  19. J. H. Cheon, Y. Kim, and H. Yoon, “A new id-based signature with batch verification,” in IACR Cryptology ePrint Archive, p. 131, 2004. View at Google Scholar
  20. C. Gentry and Z. Ramzan, “Identity-based aggregate signatures,” in Public Key Cryptography, vol. 3958 of Lecture Notes in Computer Science, pp. 257–273, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  21. X. Liu, J. Ma, Q. Li, J. Xiong, and F. Huang, “Attribute based multi-signature scheme in the standard model,” in Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS '13), pp. 738–742, IEEE, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Liu, T. Zhang, J. Ma, H. Zhu, and F. Cai, “Efficient data integrity verification using attribute based multi-signature scheme in wireless network,” in Proceedings of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS '13), pp. 173–180, IEEE, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Li, Q. Wang, C. Wang, and K. Ren, “Enhancing attribute-based encryption with attribute hierarchy,” Mobile Networks and Applications, vol. 16, no. 5, pp. 553–561, 2011. View at Publisher · View at Google Scholar · View at Scopus