Security Model of Proxy-Multi Signature Schemes
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Although some work has been done in proxy-multi signature schemes, until now there is no formalized definition and security model for them. In this paper, we will give the formal definition and a security model of proxy-multi signature scheme. We also constructed a proxy-multi signature scheme based on the BLS short signature scheme and proved its security in our security model.
KeywordsOriginal Signer Signature Scheme Security Model Proxy Signer Proxy Signature Scheme
Unable to display preview. Download preview PDF.
- 1.Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights, at: http://eprint.iacr.org/2003/096
- 2.Wang, Q., Cao, Z.: Security arguments for partial delegation with warrant proxy signature Schemes (2004), at: http://eprint.iacr.org//315
- 4.Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science E79-A(9), 1338–1354 (1996)Google Scholar
- 10.Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: SCIS 2001, January 23–26, vol. 2/2, pp. 603–608 (2001)Google Scholar