An efficient nonrepudiable threshold proxy signature scheme with known signers

被引:128
|
作者
Sun, HM [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng, Taichung County, Taiwan
关键词
cryptography; digital signature; proxy signature; threshold proxy signature;
D O I
10.1016/S0140-3664(99)00029-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. A threshold proxy signature scheme with the nonrepudiation property is a scheme with the capability that any verifier can identify the proxy group which is responsible for a proxy signature, while the proxy group cannot deny. So far, there have been two threshold proxy signature schemes proposed. Of these, Kim's scheme is nonrepudiable, but Zhang's scheme is not. Ln these two schemes, the t proxy signers from the group who actually sign the message are unknown and unidentified. This is very inconvenient for auditing purposes. For the responsibility of the actual signers and the traceability of adversarial signers, it is sometimes necessary to identify who the actual signers are. In this article, we propose the nonrepudiable threshold proxy signature scheme with known signers which is a nonrepudiable threshold proxy signature scheme with the property that the actual signers from the proxy group are known and identified. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:717 / 722
页数:6
相关论文
共 50 条
  • [1] On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
    Yang, CY
    Tzeng, SF
    Hwang, MS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 507 - 514
  • [2] Cryanalysis on a nonrepudiable threshold proxy signature scheme with known signers
    Xiao, Hongguang
    Tan, Zuowen
    Jian, Wang
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 809 - +
  • [3] New nonrepudiable threshold proxy signature scheme with known signers
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 119 - 124
  • [4] An improved nonrepudiable threshold proxy signature scheme with known signers
    Liu, Xin
    Xu, Qiu-Liang
    Shang, Jiu-Qing
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 298 - +
  • [5] An improvement of nonrepudiable threshold proxy signature scheme with known signers
    Tzeng, SF
    Hwang, MS
    Yang, CY
    [J]. COMPUTERS & SECURITY, 2004, 23 (02) : 174 - 178
  • [6] Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
    Hsu, CL
    Wu, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 305 - 319
  • [7] Analysis and Correction on a Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
    Sun, Fang
    Qi, Chuanda
    Niu, Lu
    Zhang, Yuna
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 176 - 179
  • [8] Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers
    Hwang, SJ
    Chen, CC
    [J]. INFORMATICA, 2003, 14 (02) : 205 - 212
  • [9] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [10] An efficient and practical (t, n) threshold proxy signature scheme with known signers
    Huang, HF
    Chang, CC
    [J]. FUNDAMENTA INFORMATICAE, 2003, 56 (03) : 243 - 253