A NOVEL EFFICIENT THRESHOLD PROXY SIGNATURE SCHEME

被引:0
|
作者
Zhang, Zhong [1 ]
Xu, Qiu-Liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250061, Peoples R China
关键词
Digital signature; Proxy signature; Threshold proxy signature; IMPROVEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the first (t,n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. But most of existing threshold proxy signature schemes were pointed out some weaknesses, which were vulnerable to the well-known attacks, such as frame attack, public-key substitute attack, warrant attack, collusion attack and so on. In this paper, we propose a novel threshold proxy signature scheme, which can resist the attacks as mentioned above. Furthermore, compared to existing threshold proxy signature schemes based on discrete logarithms, our scheme is more efficient than them.
引用
收藏
页码:375 / 377
页数:3
相关论文
共 50 条
  • [1] A novel efficient (t, n) threshold proxy signature scheme
    Huang, HF
    Chang, CC
    [J]. INFORMATION SCIENCES, 2006, 176 (10) : 1338 - 1349
  • [2] A Novel Hybrid Threshold Proxy Signature Scheme
    Yang, Xin
    Zhang, Long
    Li, Chunming
    Li, Guoqiang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 25 - 28
  • [3] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [4] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [5] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [6] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [7] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [8] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [9] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [10] Efficient Identity Based Threshold Proxy Signature Scheme in Cloud Environment
    Qiao, Yingying
    Jiang, Xiaonan
    Lin, Hao Wen
    Pan, Jeng-Shyang
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 53 - 56