Dynamic Threshold Proxy Authenticated Encryption Scheme

被引:0
作者
Song Yubo [1 ]
Hu Aiqun [1 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
authenticated encryption scheme; threshold proxy signature; dynamic threshold;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The authenticated encryption schemes can be used to provides integration, authentication, and non-repudiation for the signing message while keeping the message secret from the public. In this paper, we propose a new (t, n) threshold proxy authenticated encryption scheme, in which at least t out of n proxy signers delegated by the original signer can sign messages on behalf of the original signer. This scheme not only has the advantages such as unforgeablity, nonrepudiation and secrecy, but also provides flexibility. We can announce the parameters to change the threshold value t. Once the combined proxy signers of threshold value t and announcing parameters that can generate a legal proxy signature, this result can enable the security to increase or reduce the threshold value flexibility. Therefore, the scheme In this paper provides an easy and convenient way to delegate the power of digitally signed message.
引用
收藏
页码:4637 / 4640
页数:4
相关论文
共 20 条
[1]  
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]  
DESMEDT Y, 1987, ADV CRYPTOLOGY CRYPT, P120
[3]  
Desmedt Y., 1991, ADV CRYPTOLOGY CRYPT, P457
[4]   GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05) :307-313
[5]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[6]   Improvements of generalization of threshold signature and authenticated encryption for group communications [J].
Hsu, CL ;
Wu, WS ;
Wu, TC .
INFORMATION PROCESSING LETTERS, 2002, 81 (01) :41-45
[7]  
HUANG HF, 2003, 5 INT C INF COMM SEC, P382
[8]  
Hwang M. S., 2005, INT J NETWORK SECURI, V1, P61
[9]   AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION [J].
LEE, WB ;
CHANG, CC .
ELECTRONICS LETTERS, 1995, 31 (19) :1656-1657
[10]  
Lee WB, 1999, J INF SCI ENG, V15, P669