Threshold proxy re-signature

被引:11
|
作者
Yang, Piyi [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; robust; threshold; unforgeable; ENCRYPTION;
D O I
10.1007/s11424-011-8370-3
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
引用
收藏
页码:816 / 824
页数:9
相关论文
共 50 条
  • [41] Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
    Vivek, S. Sree
    Balasubramanian, Guhan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 186 - 193
  • [42] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [43] Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Tsai, Pei-Ling
    INFORMATION SCIENCES, 2007, 177 (02) : 543 - 549
  • [44] TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications
    Pareek, Gaurav
    Purushothama, B. R.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1943 - 1965
  • [45] TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications
    Gaurav Pareek
    B. R. Purushothama
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1943 - 1965
  • [46] Threshold- Based Pairing-free Conditional Anonymous Proxy Re-Encryption Scheme
    Li Zhaobin
    Zhao Hong
    Wei Zhanzhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3350 - 3358
  • [47] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [48] On the security of a proxy signature scheme in the standard model
    Yuan, Yumin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 675 - 681
  • [49] Proxy re-signatures in the standard model
    Chow, Sherman S. M.
    Phan, Raphael C. -W.
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 260 - +
  • [50] Provably secure certificateless proxy signature scheme in the standard model
    Lu, Yang
    Li, Jiguo
    THEORETICAL COMPUTER SCIENCE, 2016, 639 : 42 - 59