Threshold proxy re-signature: definition and new constructions

被引:4
|
作者
Chen, Xi [1 ]
Liu, Yun [1 ]
Harn, Lein [2 ]
Li, Yong [1 ,3 ,4 ]
Yao, Ge [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Beijing, Peoples R China
[2] Univ Missouri, Sch Comp & Engn, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[5] Univ Melbourne, Sch Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Information security; cryptography; secret sharing; proxy re-signature; SCHEME; SECRET;
D O I
10.1080/02533839.2018.1437362
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [1] THRESHOLD PROXY RE-SIGNATURE
    Piyi YANG·Zhenfu CAO·Xiaolei DONG Department of Computer Science and Engineering
    JournalofSystemsScience&Complexity, 2011, 24 (04) : 816 - 824
  • [2] Threshold proxy re-signature
    Piyi Yang
    Zhenfu Cao
    Xiaolei Dong
    Journal of Systems Science and Complexity, 2011, 24 : 816 - 824
  • [3] Threshold proxy re-signature
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (04) : 816 - 824
  • [4] Flexible Threshold Proxy Re-signature Schemes
    Yang Xiaodong
    Wang Caifen
    Lan Caihui
    Wang Biao
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 691 - 696
  • [5] Analysis and Improvement of Certificateless signature and Proxy re-signature schemes
    Hu, Xiaoming
    Liu, Yan
    Xu, Huajie
    Wang, Jian
    Zhang, Xiaojun
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 166 - 170
  • [6] A Certificateiess Proxy Re-Signature Scheme
    Guo Duntao
    Wei Ping
    Yu Dan
    Yang Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 157 - 161
  • [7] Simplified universally composable proxy re-signature
    Hong X.
    Chen K.-F.
    Wan Z.-M.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (08): : 2079 - 2088
  • [8] A New Certificateless Proxy Re-signature Scheme In The Standard Model
    Chen, Liang
    Chen, XingYuan
    Sun, Yi
    Du, XueHui
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 202 - 206
  • [9] Proxy Re-signature Supporting Conditional Delegation
    Wang, Xu An
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 844 - 848
  • [10] Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
    Lv, Guoning
    Lei, Yanfang
    Hu, Mingsheng
    Cheng, Yage
    Gong, Bei
    Fu, Junjun
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 44 - 57