Threshold proxy re-signature

被引:11
|
作者
Yang, Piyi [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; robust; threshold; unforgeable; ENCRYPTION;
D O I
10.1007/s11424-011-8370-3
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
引用
收藏
页码:816 / 824
页数:9
相关论文
共 50 条
  • [1] THRESHOLD PROXY RE-SIGNATURE
    Piyi YANG·Zhenfu CAO·Xiaolei DONG Department of Computer Science and Engineering
    JournalofSystemsScience&Complexity, 2011, 24 (04) : 816 - 824
  • [2] Threshold proxy re-signature
    Piyi Yang
    Zhenfu Cao
    Xiaolei Dong
    Journal of Systems Science and Complexity, 2011, 24 : 816 - 824
  • [3] Flexible Threshold Proxy Re-signature Schemes
    Yang Xiaodong
    Wang Caifen
    Lan Caihui
    Wang Biao
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 691 - 696
  • [4] Threshold proxy re-signature: definition and new constructions
    Chen, Xi
    Liu, Yun
    Harn, Lein
    Li, Yong
    Yao, Ge
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2018, 41 (02) : 141 - 148
  • [5] Proxy Re-signature Supporting Conditional Delegation
    Wang, Xu An
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 844 - 848
  • [6] A Certificateiess Proxy Re-Signature Scheme
    Guo Duntao
    Wei Ping
    Yu Dan
    Yang Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 157 - 161
  • [7] Simplified universally composable proxy re-signature
    Hong X.
    Chen K.-F.
    Wan Z.-M.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (08): : 2079 - 2088
  • [8] Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems☆
    Zhang, Qiu
    Sun, Yinxia
    Lu, Yang
    Zhang, Guoqiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [9] Analysis and Improvement of Certificateless signature and Proxy re-signature schemes
    Hu, Xiaoming
    Liu, Yan
    Xu, Huajie
    Wang, Jian
    Zhang, Xiaojun
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 166 - 170
  • [10] Unidirectional Identity-based Proxy Re-Signature
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,