Threshold proxy re-signature: definition and new constructions

被引:4
|
作者
Chen, Xi [1 ]
Liu, Yun [1 ]
Harn, Lein [2 ]
Li, Yong [1 ,3 ,4 ]
Yao, Ge [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Beijing, Peoples R China
[2] Univ Missouri, Sch Comp & Engn, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[5] Univ Melbourne, Sch Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Information security; cryptography; secret sharing; proxy re-signature; SCHEME; SECRET;
D O I
10.1080/02533839.2018.1437362
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [41] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [42] Improvement of threshold proxy signature scheme
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [43] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [44] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    Journal of Electronics(China), 2006, (04) : 560 - 563
  • [45] A New Revocable and Re-Delegable Proxy Signature and Its Application
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (02) : 380 - 399
  • [46] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [47] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [48] Efficient threshold proxy signature protocol for mobile agents
    Hong, Xuan
    INFORMATION SCIENCES, 2009, 179 (24) : 4243 - 4248
  • [49] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    Science China(Physics,Mechanics & Astronomy), 2013, Mechanics & Astronomy)2013 (03) : 519 - 523
  • [50] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523