Threshold proxy re-signature

被引:11
|
作者
Yang, Piyi [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; robust; threshold; unforgeable; ENCRYPTION;
D O I
10.1007/s11424-011-8370-3
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
引用
收藏
页码:816 / 824
页数:9
相关论文
共 50 条
  • [31] Non-interactive Conditional Proxy Re-Signature in the Standard Model
    Lee, Eunsung
    Kim, Sang Woo
    COMPUTER JOURNAL, 2018, 61 (12): : 1772 - 1782
  • [32] Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme
    Sunitha, N. R.
    Amberker, B. Bharat
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 270 - +
  • [33] Proxy re-signature scheme with cryptographic reverse firewall for medical data security
    Yang, Xiaodong
    Wei, Lizhen
    Li, Songyu
    Du, Xiaoni
    Wang, Caifen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3459 - 3475
  • [34] Cross-Domain Authentication Scheme Based on Proxy Re-Signature in Cloud Environment
    Yang X.-D.
    An F.-Y.
    Yang P.
    Liu T.-T.
    Xiao L.-K.
    Wang C.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 756 - 771
  • [35] Revocable identity-based proxy re-signature against signing key exposure
    Yang, Xiaodong
    Chen, Chunlin
    Ma, Tingchun
    Wang, Jinli
    Wang, Caifen
    PLOS ONE, 2018, 13 (03):
  • [36] Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
    Chen, Yanan
    Yao, Ting
    Ren, Haiping
    Gan, Zehao
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (03): : 1497 - 1513
  • [37] Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
    Chen, Wenbin
    Li, Jin
    Huang, Zhengan
    Gao, Chongzhi
    Yiu, Siuming
    Jiang, Zoe L.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 120 : 137 - 148
  • [38] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [39] A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
    Yang, Tao
    Xiong, Hu
    Hu, Jianbin
    Wang, Yonggang
    Deng, Yong
    Xiao, Biao
    Chen, Zhong
    WEB TECHNOLOGIES AND APPLICATIONS, 2011, 6612 : 376 - +
  • [40] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    INFORMATICA, 2010, 21 (01) : 41 - 56