Flexible Threshold Proxy Re-signature Schemes

被引:0
|
作者
Yang Xiaodong [1 ]
Wang Caifen [1 ]
Lan Caihui [1 ]
Wang Biao [2 ]
机构
[1] NW Normal Univ, Coll Math & Informat Sci, Lanzhou 730070, Peoples R China
[2] Jiangsu Univ Sci & Technol, Inst Elect Informat, Zhenjiang 212003, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2011年 / 20卷 / 04期
基金
中国国家自然科学基金;
关键词
Flexible threshold; Proxy re-signature; Provable security; Standard model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Threshold proxy re-signatures are extensions of proxy re-signatures where re-signature keys are shared among a proxies in such a way that at least k out of n proxies must collaborate to generate the delegator's signatures. The adversary must compromise at least k proxies to learn the re-signing key. Threshold proxy re-signature can protect re-signature key from the attack of internal and external adversaries. However, threshold values in previous threshold proxy re-signatures are fixed. Two flexible threshold proxy re-signature schemes are proposed in this paper, which are existentially unforgeable and robust in the standard model. Based on the Chinese Remainder Theorem, threshold value and the number of proxies can be altered with the significance of the document to be signed. According to the variable threshold value, each proxy can locally generate his re-signature key share and the corresponding verification key. Meanwhile, the proxy re-signature share generation and verification algorithms are non-interactive.
引用
收藏
页码:691 / 696
页数:6
相关论文
共 50 条
  • [1] Threshold Proxy Re-signature Schemes in the Standard Model
    Yang Xiaodong
    Wang Caifen
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 345 - 350
  • [2] THRESHOLD PROXY RE-SIGNATURE
    Piyi YANG·Zhenfu CAO·Xiaolei DONG Department of Computer Science and Engineering
    JournalofSystemsScience&Complexity, 2011, 24 (04) : 816 - 824
  • [3] Threshold proxy re-signature
    Piyi Yang
    Zhenfu Cao
    Xiaolei Dong
    Journal of Systems Science and Complexity, 2011, 24 : 816 - 824
  • [4] Threshold Proxy Re-Signature
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 450 - 455
  • [5] Threshold proxy re-signature
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (04) : 816 - 824
  • [6] Analysis and Improvement of Certificateless signature and Proxy re-signature schemes
    Hu, Xiaoming
    Liu, Yan
    Xu, Huajie
    Wang, Jian
    Zhang, Xiaojun
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 166 - 170
  • [7] Threshold proxy re-signature: definition and new constructions
    Chen, Xi
    Liu, Yun
    Harn, Lein
    Li, Yong
    Yao, Ge
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2018, 41 (02) : 141 - 148
  • [8] Proxy re-signature schemes without random oracles
    Shao, Jun
    Cao, Zhenfu
    Wang, Licheng
    Liang, Xiaohui
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 197 - 209
  • [9] A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another
    Chaudhari, Shilpa
    Aparna, R.
    Rane, Archana
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 24 - 49
  • [10] The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
    Shao, Jun
    Feng, Min
    Zhu, Bin
    Cao, Zhenfu
    Liu, Peng
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 216 - +