A NOVEL EFFICIENT THRESHOLD PROXY SIGNATURE SCHEME

被引:0
|
作者
Zhang, Zhong [1 ]
Xu, Qiu-Liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250061, Peoples R China
关键词
Digital signature; Proxy signature; Threshold proxy signature; IMPROVEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the first (t,n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. But most of existing threshold proxy signature schemes were pointed out some weaknesses, which were vulnerable to the well-known attacks, such as frame attack, public-key substitute attack, warrant attack, collusion attack and so on. In this paper, we propose a novel threshold proxy signature scheme, which can resist the attacks as mentioned above. Furthermore, compared to existing threshold proxy signature schemes based on discrete logarithms, our scheme is more efficient than them.
引用
收藏
页码:375 / 377
页数:3
相关论文
共 50 条
  • [21] A secure threshold Paillier proxy signature scheme
    Pei-yih Ting
    Xiao-wei Huang
    Jun-hui Wu
    Chia-huei Hseu
    [J]. Journal of Zhejiang University SCIENCE C, 2010, 11 : 206 - 213
  • [22] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [23] An efficient and practical (t, n) threshold proxy signature scheme with known signers
    Huang, HF
    Chang, CC
    [J]. FUNDAMENTA INFORMATICAE, 2003, 56 (03) : 243 - 253
  • [24] An efficient proxy signature scheme with revocation
    Das, ML
    Saxena, AT
    Gulati, VP
    [J]. INFORMATICA, 2004, 15 (04) : 455 - 464
  • [25] Efficient Certificateless Proxy Signature Scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Huang, Huawei
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (01) : 85 - 100
  • [26] Threshold proxy quantum signature scheme with threshold shared verification
    YANG YuGuang1
    2 State Key Laboratory of Networking and Switching Technology
    3 State Key Laboratory of Integrated Services Network
    4 State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences)
    [J]. Science China(Physics,Mechanics & Astronomy), 2008, (08) : 1079 - 1088
  • [27] Threshold proxy quantum signature scheme with threshold shared verification
    YuGuang Yang
    QiaoYan Wen
    [J]. Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1079 - 1088
  • [28] Threshold proxy quantum signature scheme with threshold shared verification
    YuGuang, Yang
    QiaoYan, Wen
    [J]. SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (08): : 1079 - 1088
  • [29] An Efficient Threshold Signature Scheme
    Zhang Chengli
    Tang Chunming
    [J]. 2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 85 - 87
  • [30] Efficient Threshold Signature Scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (01) : 112 - 116