Threshold proxy re-signature: definition and new constructions

被引:4
|
作者
Chen, Xi [1 ]
Liu, Yun [1 ]
Harn, Lein [2 ]
Li, Yong [1 ,3 ,4 ]
Yao, Ge [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Beijing, Peoples R China
[2] Univ Missouri, Sch Comp & Engn, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[5] Univ Melbourne, Sch Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Information security; cryptography; secret sharing; proxy re-signature; SCHEME; SECRET;
D O I
10.1080/02533839.2018.1437362
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [31] A multi-use unidirectional certificateless proxy re-signature scheme
    Yan Wu
    Hu Xiong
    Chuanjie Jin
    Telecommunication Systems, 2020, 73 : 455 - 467
  • [32] Universally composable secure proxy re-signature scheme with effective calculation
    Hong, Xuan
    Gao, Jianhua
    Pan, Jianguo
    Zhang, Bo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10075 - S10084
  • [33] Non-interactive Conditional Proxy Re-Signature in the Standard Model
    Lee, Eunsung
    Kim, Sang Woo
    COMPUTER JOURNAL, 2018, 61 (12): : 1772 - 1782
  • [34] Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme
    Sunitha, N. R.
    Amberker, B. Bharat
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 270 - +
  • [35] Proxy re-signature scheme with cryptographic reverse firewall for medical data security
    Yang, Xiaodong
    Wei, Lizhen
    Li, Songyu
    Du, Xiaoni
    Wang, Caifen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3459 - 3475
  • [36] Cross-Domain Authentication Scheme Based on Proxy Re-Signature in Cloud Environment
    Yang X.-D.
    An F.-Y.
    Yang P.
    Liu T.-T.
    Xiao L.-K.
    Wang C.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 756 - 771
  • [37] Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
    Chen, Yanan
    Yao, Ting
    Ren, Haiping
    Gan, Zehao
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (03): : 1497 - 1513
  • [38] Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
    Chen, Wenbin
    Li, Jin
    Huang, Zhengan
    Gao, Chongzhi
    Yiu, Siuming
    Jiang, Zoe L.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 120 : 137 - 148
  • [39] Traceable Threshold Proxy Signature
    Gu, Ke
    Wang, Yong
    Wen, Sheng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (01) : 63 - 79
  • [40] The security analysis of a threshold proxy quantum signature scheme
    Shi JianHong
    Zhang ShengLi
    Chang ZhengGang
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2013, 56 (03) : 519 - 523