A robust (k, n)+1 threshold proxy signature scheme based on factoring

被引:13
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
Zhu, HJ [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
proxy signature; threshold signature; improved RSA scheme; factoring;
D O I
10.1016/j.amc.2004.04.104
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Proxy signature is an active cryptographic research area. Since Mambo et at. introduced the concept of proxy signature in 1996, many proxy signature schemes have been proposed. However, most of these previously proposed schemes are based on discrete logarithm problems. In this paper, we would like to propose a new robust (k,n) + 1 threshold proxy signature scheme based on factoring. In this scheme, generating a valid proxy signature needs not only any k or more members in n proxy signers but also a trusted dealer to cooperatively sign a message. To our best knowledge, this is the first (k,n) + 1 threshold proxy signature scheme based on factoring. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 50 条
  • [1] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [2] A (k, n) threshold nominative proxy signature scheme for electronic commerce
    Xin, Xiang-Jun
    Wang, Mei-Zhi
    Xiao, Guo-Zhen
    [J]. Journal of China University of Mining and Technology, 2006, 16 (04): : 470 - 474
  • [4] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [5] A New Threshold Signature Scheme Based on ECC and Factoring
    Qi, Chengming
    Cui, Shoumei
    Hao, Ling
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 550 - +
  • [6] Threshold Signature Scheme Based on Factoring and Discrete Logarithms
    Mohamad, S. A.
    Ismail, E. S.
    [J]. INTERNATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED SCIENCES 2012 (ICFAS2012), 2012, 1482 : 460 - 463
  • [7] Factoring based proxy signature schemes
    Xue, Qingshui
    Cao, Zhenfu
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2006, 195 (1-2) : 229 - 241
  • [8] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [9] Proxy signature schemes based on factoring
    Shao, Z
    [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (03) : 137 - 143
  • [10] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579