Abstract
We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21141 kinds of signature models can be derived by appropriately combining different general classes. The result comprises almost existing signature models. It will be helpful for exploring new signature models. To the best of our knowledge, it is the first time for investigation of the problem of classification of signature-only signature models.
Similar content being viewed by others
References
Itakura K, Nakamura K. A public key cryptosystem suitable for digital multisignatures. NEC Res Dev, 1983, 71: 1–8
Desmedt Y, Frankel Y. Threshold cryptosystems. In: Advances in Cryptology-Crypto’89, LNCS 435. Berlin: Springer-Verlag, 1989. 457–469
Chaum D, Heyst E. Group signatures. In: Advances in Cryptology-Eurocrypt’91, LNCS 950. Berlin: Springer-Verlag, 1992. 257–265
Camenisch J. Efficient and generalized group signatures. In: Advances in Cryptology-Eurocrypt’97, LNCS 1233. Berlin: Springer-Verlag, 1997. 465–479
Rivest R, Shamir A, Tauman Y. How to leak a secret. In: Advances in Cryptology-Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001. 552–565
Liu J, Wei V, Wong D. Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). In: In: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004. 325–335
Bresson E, Stern J, Szydlo M. Threshold ring signature sand applications to Ad-hoc groups. In: Advances in Cryptology-CRYPTO 2002, LNCS 2442. Berlin: Springer-Verlag, 2002. 465–480
Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans Fundamentals, 1996, E79-A(9): 1338–1353
Hwang J, Shi C. A simple multi-proxy signature scheme. Commun CCISA, 2001, 8(1): 88–92
Zhang K. Threshold proxy signature schemes. In: Proceeding of Information Security Workshop (ISW’97), LNCS 1396. Berlin: Springer-Verlag, 1997. 2820–290
Zhang F g, Safavi-Naini R, Lin C. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. ePrint Report 2003/104, http://eprint.iacr.org/2003/104
Yi L, Bai G, Xiao G. Proxy multi-signature scheme. A new type of proxy signature scheme. Elect Lett, 2000, 36(6): 527–528
Hwang J, Chen C. A New multi-proxy multi-signature scheme. In: 2001 National Computer Symposium: Information Security, Taiwan, 2001. 1019–1026
Tzeng S, Yang C, Hwang M S. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Computer Systems Archive (June 2004), Special issue: Computational chemistry and molecular dynamics, 2004, 20(5): 887–893
Jakobsson M, Sako K, Impagliazzo Rl. Designated verifier proofs and their applications. In: Advances in Cryptology-Eurocrypt’96, LNCS 1070. Berlin: Springer-Verlag, 1996. 143–154
Ching Y, Susilo W, Mu Y. Universal designated multi verifier signature schemes. In: Proceedings of the International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Japan. New York: IEEE Press, 2005. 305–309
Kim S, Park S, Won D. Zero-knowledge nominative signatures. In: Proceeding of PragoCrypt’96, International Conference on the Theory and Applications of Cryptology, 1996. 380–392
Chaum D, Antwerpen H. Undeniable signatures. In: CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989. 212–216
Chaum D. Designated confirmer signatures. In: Eurocrypt’94, LNCS 950. Berlin: Springer-Verlag, 1994. 86–91
Chaum D. Blind signatures for untraceable payments. In: Crypto’82, New York: Plenum Press, 1983. 199–203
Stadler M, Piveteau J, Camenisch J. Fair blind signatures. In: EUROCRYPT’95, LNCS 921. Berlin: Springer-Verlag, 1995. 209–219
Brands S. Untraceable Off-line cash in wallet with observers. In: Advances in Cryptology-Crypto’93, LNCS 773. Berlin: Springer-Verlag, 1993. 302–318
Abe Mi, Fujisaki E. How to date blind signatures. In: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology’96, 1996. 244–251
Maitland G, Boyd C. A provably secure restrictive partially blind signature scheme. In: PKC 2002, LNCS 2274. Berlin: Springer-Verlag, 2002. 99–114
Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptology-Crypto’84, LNCS 196, Berlin: Springer-Verlag, 1985. 47–53
Bellare M, Miner S. A forward-secure digital signature scheme. In: Advances in Cryptology-Crypto’99, LNCS 1666. Berlin: Springer-Verlag, 1999. 431–448
Wang Guilin. Designated-verifier proxy signature schemes. In: Security and Privacy in the Age of Ubiquitous Computing (IFIP/ SEC 2005). Berlin: Springer-Verlag, 2005. 409–423
Park H, Lee I. A digital nominative proxy signature scheme for mobile communication. In: Proceeding of ICICS 2001, International Conference on Information and Communications Security, LNCS 2229. Berlin: Springer-Verlag, 2001. 451–455
Yun S, Lee H. The undeniable multi-signature scheme suitable for joint copyright protection on digital contents. PCM(3) 2004. 402–409
Li JiGuo, Cao ZhenFu, Zhang YiChen. Nonrepudiable proxy multi-signature scheme. J Comp Sci Tech Archive, 2003, 18(3): 399–402
Chen Xiaofeng, Zhang Fangguo, Kim K. ID-based multi-proxy signature and blind multisignature from bilinear pairings. In: KIISC Conference 2003, Korea, August 17, 2003. 11–19
Juang W, Lei C. Blind threshold signatures based on discrete logarithm. In: Proceeding of the Second Asian Computing Science Conference on Programming, Concurrency and Parallelism, Networking and Security, LNCS 1179. Berlin: Springer-Verlag, 1996. 172–181
Juang W, Lei C. Partially blind threshold signatures based on discrete logarithm. Comp Commun, 1999, 22: 73–86
Lysyanskaya A, Ramzan Z. Group blind digital signatures: a scalable solution to electronic cash. In: Financial Cryptography, the Second International Conference, 1998, LNCS 1465. Berlin: Springer-Verlag, 1998. 184–197
Chan T, Fung K, Liu J, Wei V. Blind spontaneous anonymous group signatures for Ad Hoc groups. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, LNCS 3313. Berlin: Springer-Verlag, 2004. 82–94
Tan Zuowen, Liu Zhuojun, Tang Chunming. A proxy blind signature scheme based on DLP. J Software (in Chinese), 2003, 14 (11): 1931–1935
Lin C, Wu T, Hwang J. ID-based structured multisignature schemes. In: Advances in Network and Distributed Syst Security. Boston: Kluwer Academic Publishers, 2001. 45–59
Awasthi A, Lal S. Id-based ring signature and proxy ring signature schemes from bilinear pairings. ePrint Report 2004/184, http://eprint.iacr.org/2004/184
Chow S, Hui L, Yiu S. Identity based threshold ring signature. ePrint Report 2004/179, http://eprint.iacr.org/2004/179
Xu J, Zhang Z F, Feng D G. ID-based proxy signature using bilinear pairings. ePrint Report 2004/206, http://eprint.iacr.org/2004/206
Xu J, Zhang Z F, Feng D G. Identity based threshold proxy signature. ePrint Report 2004/250, http://eprint.iacr.org/2004/250
Zhang F G, Kim K. ID-based blind signature and ring signature from pairings. In: ASIACRYPT 2002. Berlin: Springer-Verlag, 2002. 533–547
Chen X F, Zhang F G, Liu S L. ID-based restrictive partially blind signatures. ePrint Report 2005/319, http://eprint.iacr.org/2005/319
Chow S, Hui C, Yiu S, et al. Two improved partially blind signature schemes from bilinear pairings. In: ACISP 2005, LNCS 3574. Berlin: Springer-Verlag, 2005. 316–328
Song D. Practical torward secure group signature schemes. In: Proceedings of the 8th ACM conference on Computer and Communications Security, 2001. ACM Press, 2001. 225–234
Liu J, Wong D. Solutions to Key Exposure Problem in Ring Signature. ePrint Report 2005/427, http://eprint.iacr.org/2005/427.
Chen M Y. A research of forward secure proxy signature scheme. Master’s Thesis, 2003, http://etdncku.lib.ncku.edu.tw/ETD-db
Duc D, Cheon I, Kim K. A forward-secure blind signature scheme based on the strong RSA Assumption. In: Information and Communications Secureity’2003, ICICS 2003. Berlin: Springer-Verlag, 2003. 11–21
Zheng D, Huang Z, Chen K F, et al. ID-based proxy blind signature. In: The 18th International Conference on Advanced Information Networking and Applications (AINA’04), 2004, 2: 380
Nybergk K, Rueppelra R. Message recovery for signature schemes based on the discrete logarithm problem. In: Advances in Cryptology-Crypto’93. Berlin: Springer-Verlag, 1993. 182–193
Pfitzmann B, Waidner M. Fail-stop signatures and their application. In: Proceeding of the 9th Worldwide Congress on Computer and Communications Security and Protection (Securicom’91), 1991. 145–160
Diffie W, Hellman M. New directions in cryptography, IEEE Trans Inform Theory, 1976, IT-22, 6: 644–654
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the Major State Basic Research Development Program of China (973 Program) (Grant No. 2004CB318000), and the Innovation Fund of Shanghai University
Rights and permissions
About this article
Cite this article
Cao, Z., Liu, M. Classification of signature-only signature models. Sci. China Ser. F-Inf. Sci. 51, 1083–1095 (2008). https://doi.org/10.1007/s11432-008-0086-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-008-0086-1