THRESHOLD PROXY RE-SIGNATURE
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential req...
Saved in:
Published in | Journal of systems science and complexity Vol. 24; no. 4; pp. 816 - 824 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Beijing
Academy of Mathematics and Systems Science, Chinese Academy of Sciences
01.08.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. |
---|---|
Bibliography: | 11-4543/O1 The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. Proxy re-signature, robust, threshold, unforgeable. |
ISSN: | 1009-6124 1559-7067 |
DOI: | 10.1007/s11424-011-8370-3 |