Advanced Search
Volume 28 Issue 7
Jan.  2011
Turn off MathJax
Article Contents
Wang Xiao-ming, Zhang Zhen, Fu Fang-wei. A Secure Threshold Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(7): 1308-1311.
Citation: Wang Xiao-ming, Zhang Zhen, Fu Fang-wei. A Secure Threshold Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2006, 28(7): 1308-1311.

A Secure Threshold Proxy Signature Scheme

  • Received Date: 2004-11-19
  • Rev Recd Date: 2005-05-19
  • Publish Date: 2006-07-19
  • A secure threshold proxy signature scheme is proposed aiming at conspiracy attack, that is, any t (t is threshold value) or more malicious proxy signatures may work together to reconstruct the secret polynomial of the proxy group and derive the secret keys of other members in the proxy group, consequently they can impersonate some other proxy signers to generate a valid threshold proxy signature. The new scheme can not only satisfy the properties of the threshold proxy signature, but also withstand the conspiracy attack. Furthermore, the proxy signers proxy signing capability can be revoked if the original signer needs.
  • loading
  • Kim S, Park S, Won D. Proxy signature, revisited. ICICS97, Lecture Notes in Computer Science, Springer,Berlin,1997, 1334: 223.232.[2]Zhang K. Threshold proxy signature scheme. 1997 Information Security Workshop, Tokyo, Japan, September, 1997: 191.197.[3]Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communication.1997, 22 (8):717.722.[4]Hwang M S, Lu J L, Lin L C. A practical (t, n) threshold proxysignature scheme based on the RSA cryptosystem[J].IEEE Trans. on Knowledge and Data Engineering.2003,15(6):1552-[5]Sun, H M Lee, N Y Hwang. T. Threshold proxy signatures[J].IEE Proc- Computers and Digital Techniques.1999, 146(5):259-[6]Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software. 2001, 58 (9): 119.124.[7]Lee N Y.[J].Hwang T, Wang C H. On Zhangs nonrepudiable proxy signatures. ACISP98, Lecture Notes in Computer Science, Springer, Berlin.1998,:-[8]Pedersen. Distributed provers with applications to undeniable signatures[J].Proc. Eurocrypt91, Lecture Notes in Computer Science, Sprinter, Berlin.1991, 547:221238-
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2418) PDF downloads(679) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return