Skip to main content
Log in

Classification of signature-only signature models

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21141 kinds of signature models can be derived by appropriately combining different general classes. The result comprises almost existing signature models. It will be helpful for exploring new signature models. To the best of our knowledge, it is the first time for investigation of the problem of classification of signature-only signature models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Itakura K, Nakamura K. A public key cryptosystem suitable for digital multisignatures. NEC Res Dev, 1983, 71: 1–8

    Google Scholar 

  2. Desmedt Y, Frankel Y. Threshold cryptosystems. In: Advances in Cryptology-Crypto’89, LNCS 435. Berlin: Springer-Verlag, 1989. 457–469

    Google Scholar 

  3. Chaum D, Heyst E. Group signatures. In: Advances in Cryptology-Eurocrypt’91, LNCS 950. Berlin: Springer-Verlag, 1992. 257–265

    Google Scholar 

  4. Camenisch J. Efficient and generalized group signatures. In: Advances in Cryptology-Eurocrypt’97, LNCS 1233. Berlin: Springer-Verlag, 1997. 465–479

    Google Scholar 

  5. Rivest R, Shamir A, Tauman Y. How to leak a secret. In: Advances in Cryptology-Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001. 552–565

    Chapter  Google Scholar 

  6. Liu J, Wei V, Wong D. Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). In: In: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004. 325–335

    Google Scholar 

  7. Bresson E, Stern J, Szydlo M. Threshold ring signature sand applications to Ad-hoc groups. In: Advances in Cryptology-CRYPTO 2002, LNCS 2442. Berlin: Springer-Verlag, 2002. 465–480

    Chapter  Google Scholar 

  8. Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans Fundamentals, 1996, E79-A(9): 1338–1353

  9. Hwang J, Shi C. A simple multi-proxy signature scheme. Commun CCISA, 2001, 8(1): 88–92

    Google Scholar 

  10. Zhang K. Threshold proxy signature schemes. In: Proceeding of Information Security Workshop (ISW’97), LNCS 1396. Berlin: Springer-Verlag, 1997. 2820–290

    Google Scholar 

  11. Zhang F g, Safavi-Naini R, Lin C. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. ePrint Report 2003/104, http://eprint.iacr.org/2003/104

  12. Yi L, Bai G, Xiao G. Proxy multi-signature scheme. A new type of proxy signature scheme. Elect Lett, 2000, 36(6): 527–528

    Article  Google Scholar 

  13. Hwang J, Chen C. A New multi-proxy multi-signature scheme. In: 2001 National Computer Symposium: Information Security, Taiwan, 2001. 1019–1026

  14. Tzeng S, Yang C, Hwang M S. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Computer Systems Archive (June 2004), Special issue: Computational chemistry and molecular dynamics, 2004, 20(5): 887–893

    Google Scholar 

  15. Jakobsson M, Sako K, Impagliazzo Rl. Designated verifier proofs and their applications. In: Advances in Cryptology-Eurocrypt’96, LNCS 1070. Berlin: Springer-Verlag, 1996. 143–154

    Google Scholar 

  16. Ching Y, Susilo W, Mu Y. Universal designated multi verifier signature schemes. In: Proceedings of the International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Japan. New York: IEEE Press, 2005. 305–309

    Google Scholar 

  17. Kim S, Park S, Won D. Zero-knowledge nominative signatures. In: Proceeding of PragoCrypt’96, International Conference on the Theory and Applications of Cryptology, 1996. 380–392

  18. Chaum D, Antwerpen H. Undeniable signatures. In: CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989. 212–216

    Google Scholar 

  19. Chaum D. Designated confirmer signatures. In: Eurocrypt’94, LNCS 950. Berlin: Springer-Verlag, 1994. 86–91

    Google Scholar 

  20. Chaum D. Blind signatures for untraceable payments. In: Crypto’82, New York: Plenum Press, 1983. 199–203

    Google Scholar 

  21. Stadler M, Piveteau J, Camenisch J. Fair blind signatures. In: EUROCRYPT’95, LNCS 921. Berlin: Springer-Verlag, 1995. 209–219

    Google Scholar 

  22. Brands S. Untraceable Off-line cash in wallet with observers. In: Advances in Cryptology-Crypto’93, LNCS 773. Berlin: Springer-Verlag, 1993. 302–318

    Google Scholar 

  23. Abe Mi, Fujisaki E. How to date blind signatures. In: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology’96, 1996. 244–251

  24. Maitland G, Boyd C. A provably secure restrictive partially blind signature scheme. In: PKC 2002, LNCS 2274. Berlin: Springer-Verlag, 2002. 99–114

    Google Scholar 

  25. Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptology-Crypto’84, LNCS 196, Berlin: Springer-Verlag, 1985. 47–53

    Google Scholar 

  26. Bellare M, Miner S. A forward-secure digital signature scheme. In: Advances in Cryptology-Crypto’99, LNCS 1666. Berlin: Springer-Verlag, 1999. 431–448

    Google Scholar 

  27. Wang Guilin. Designated-verifier proxy signature schemes. In: Security and Privacy in the Age of Ubiquitous Computing (IFIP/ SEC 2005). Berlin: Springer-Verlag, 2005. 409–423

    Chapter  Google Scholar 

  28. Park H, Lee I. A digital nominative proxy signature scheme for mobile communication. In: Proceeding of ICICS 2001, International Conference on Information and Communications Security, LNCS 2229. Berlin: Springer-Verlag, 2001. 451–455

    Google Scholar 

  29. Yun S, Lee H. The undeniable multi-signature scheme suitable for joint copyright protection on digital contents. PCM(3) 2004. 402–409

  30. Li JiGuo, Cao ZhenFu, Zhang YiChen. Nonrepudiable proxy multi-signature scheme. J Comp Sci Tech Archive, 2003, 18(3): 399–402

    Article  MATH  MathSciNet  Google Scholar 

  31. Chen Xiaofeng, Zhang Fangguo, Kim K. ID-based multi-proxy signature and blind multisignature from bilinear pairings. In: KIISC Conference 2003, Korea, August 17, 2003. 11–19

  32. Juang W, Lei C. Blind threshold signatures based on discrete logarithm. In: Proceeding of the Second Asian Computing Science Conference on Programming, Concurrency and Parallelism, Networking and Security, LNCS 1179. Berlin: Springer-Verlag, 1996. 172–181

    Chapter  Google Scholar 

  33. Juang W, Lei C. Partially blind threshold signatures based on discrete logarithm. Comp Commun, 1999, 22: 73–86

    Article  Google Scholar 

  34. Lysyanskaya A, Ramzan Z. Group blind digital signatures: a scalable solution to electronic cash. In: Financial Cryptography, the Second International Conference, 1998, LNCS 1465. Berlin: Springer-Verlag, 1998. 184–197

    Google Scholar 

  35. Chan T, Fung K, Liu J, Wei V. Blind spontaneous anonymous group signatures for Ad Hoc groups. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, LNCS 3313. Berlin: Springer-Verlag, 2004. 82–94

    Google Scholar 

  36. Tan Zuowen, Liu Zhuojun, Tang Chunming. A proxy blind signature scheme based on DLP. J Software (in Chinese), 2003, 14 (11): 1931–1935

    MATH  MathSciNet  Google Scholar 

  37. Lin C, Wu T, Hwang J. ID-based structured multisignature schemes. In: Advances in Network and Distributed Syst Security. Boston: Kluwer Academic Publishers, 2001. 45–59

    Google Scholar 

  38. Awasthi A, Lal S. Id-based ring signature and proxy ring signature schemes from bilinear pairings. ePrint Report 2004/184, http://eprint.iacr.org/2004/184

  39. Chow S, Hui L, Yiu S. Identity based threshold ring signature. ePrint Report 2004/179, http://eprint.iacr.org/2004/179

  40. Xu J, Zhang Z F, Feng D G. ID-based proxy signature using bilinear pairings. ePrint Report 2004/206, http://eprint.iacr.org/2004/206

  41. Xu J, Zhang Z F, Feng D G. Identity based threshold proxy signature. ePrint Report 2004/250, http://eprint.iacr.org/2004/250

  42. Zhang F G, Kim K. ID-based blind signature and ring signature from pairings. In: ASIACRYPT 2002. Berlin: Springer-Verlag, 2002. 533–547

    Chapter  Google Scholar 

  43. Chen X F, Zhang F G, Liu S L. ID-based restrictive partially blind signatures. ePrint Report 2005/319, http://eprint.iacr.org/2005/319

  44. Chow S, Hui C, Yiu S, et al. Two improved partially blind signature schemes from bilinear pairings. In: ACISP 2005, LNCS 3574. Berlin: Springer-Verlag, 2005. 316–328

    Google Scholar 

  45. Song D. Practical torward secure group signature schemes. In: Proceedings of the 8th ACM conference on Computer and Communications Security, 2001. ACM Press, 2001. 225–234

  46. Liu J, Wong D. Solutions to Key Exposure Problem in Ring Signature. ePrint Report 2005/427, http://eprint.iacr.org/2005/427.

  47. Chen M Y. A research of forward secure proxy signature scheme. Master’s Thesis, 2003, http://etdncku.lib.ncku.edu.tw/ETD-db

  48. Duc D, Cheon I, Kim K. A forward-secure blind signature scheme based on the strong RSA Assumption. In: Information and Communications Secureity’2003, ICICS 2003. Berlin: Springer-Verlag, 2003. 11–21

    Google Scholar 

  49. Zheng D, Huang Z, Chen K F, et al. ID-based proxy blind signature. In: The 18th International Conference on Advanced Information Networking and Applications (AINA’04), 2004, 2: 380

    Article  Google Scholar 

  50. Nybergk K, Rueppelra R. Message recovery for signature schemes based on the discrete logarithm problem. In: Advances in Cryptology-Crypto’93. Berlin: Springer-Verlag, 1993. 182–193

    Google Scholar 

  51. Pfitzmann B, Waidner M. Fail-stop signatures and their application. In: Proceeding of the 9th Worldwide Congress on Computer and Communications Security and Protection (Securicom’91), 1991. 145–160

  52. Diffie W, Hellman M. New directions in cryptography, IEEE Trans Inform Theory, 1976, IT-22, 6: 644–654

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ZhengJun Cao.

Additional information

Supported by the Major State Basic Research Development Program of China (973 Program) (Grant No. 2004CB318000), and the Innovation Fund of Shanghai University

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cao, Z., Liu, M. Classification of signature-only signature models. Sci. China Ser. F-Inf. Sci. 51, 1083–1095 (2008). https://doi.org/10.1007/s11432-008-0086-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-008-0086-1

Keywords

Navigation