Robust T-out-of-N proxy signature based on RSA cryptosystems

被引:0
|
作者
Chang, Ya-Fen [1 ]
Chang, Chin-Chen [2 ,3 ]
机构
[1] Natl Taiwan Inst Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
关键词
cryptography; (t; n); threshold; RSA; proxy signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proxy signature allows one user to delegate his signing capacity to other people. No proxy signature scheme based on the widespread RSA cryptosystem was proposed until 2003. However, the first RSA-based (t, n) threshold proxy signature scheme suffers from some drawbacks: (1) the original signer's private key can be derived and () the delegates' identities need to be chosen carefully. In this paper, we will propose an improved RSA-based (t, n) threshold proxy signature scheme with free-will identities and without the hell) of the trusted combiner. Moreover, the proposed scheme ensures the proxy signers' partial anonymity to provide the real proxy signers' privacy for safety, and no proxy signing key will be retrieved by the cooperation of the proxy signers.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [1] E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
    Chen, Jingyu
    Gong, Linming
    Ma, Xiangxiang
    Wang, Daoshun
    [J]. International Journal of Network Security, 2024, 26 (05) : 851 - 860
  • [2] Robust non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem
    Chang, Ya-Fen
    Chang, Chin-Chen
    Cheng, Yi-Fang
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (01): : 93 - 109
  • [3] A t-out-of-n Redactable Signature Scheme
    Tezuka, Masayuki
    Su, Xiangyu
    Tanaka, Keisuke
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 470 - 489
  • [4] Robust t-out-of-n oblivious transfer mechanism based on CRT
    Chang, Chin-Chen
    Lee, Jung-San
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (01) : 226 - 235
  • [5] Non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem
    Chang, Ya-Fen
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 45 - 48
  • [6] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [7] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [8] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [9] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems
    Lu, Dianjun
    Zhang, Bingru
    Wang, Yun
    Li, Xinyan
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
  • [10] A provably secure t-out-of-n oblivious transfer mechanism based on blind signature
    Chang, Chin-Chen
    Cheng, Ting-Fang
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5 (01): : 1 - 12