期刊文献+

Identity-based threshold signature and mediated proxy signature schemes 被引量:3

Identity-based threshold signature and mediated proxy signature schemes
原文传递
导出
摘要 Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第2期69-74,共6页 中国邮电高校学报(英文版)
基金 the National Natural Science Foundation of China (60573043, 60372046).
关键词 IDENTITY-BASED threshold signature mediated proxy signature bilinear pairings identity-based, threshold signature, mediated proxy signature, bilinear pairings
  • 相关文献

参考文献1

二级参考文献18

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2邱慧敏,杨义先,胡正名,周锡增.一种基于ElGamal数字签名的双向用户鉴别方案[J].北京邮电大学学报,2005,28(3):100-102. 被引量:9
  • 3Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996, E79-A (9): 1338-1353.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C] // Proc 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996: 48-57.
  • 5Kim S, Park S, Won D. Proxy signature, revisited[C]// International Conference on Information and Communication Security. [S.l.]: Springer-Verlag, 1997: 223-232.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and its application [C] // Proc of ACISP 2001. Japan: [s. n.], 2001: 603-608.
  • 7Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature [C] // Proc of ACISP 2001. London: Springer-Verlag, 2001: 474-486.
  • 8Kim H, Baek J, Lee B, et al. Computing with secrets for mobile agent using one-time proxy signature [C] // ACISP 2001. Japan: [s.n.], 2001: 845-850.
  • 9Tzeng S F, Hwang M S, Yang C Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Security, 2004 (23) : 174-178.
  • 10Petersen H, Horster P. Self-certified keys-concepts and applications[C] // Proc of 3rd Conference on Communications and Multimedia Security. [S. l.] : Chapman & Hall, 1997: 102-116.

共引文献3

同被引文献13

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部