Proxy and threshold one-time signatures

被引:0
|
作者
Al-Ibrahim, M [1 ]
Cerny, A
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp, Sydney, NSW 2109, Australia
[2] Kuwait Univ, Dept Math & Comp Sci, Safat 13060, Kuwait
关键词
one-time signature; proxy signature; group signatures; digital signatures; threshold cryptography; broadcast authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One-time signatures are an important and efficient authentication utility. Various schemes already exist for the classical one-way public-key cryptography. One-time signatures have not been sufficiently explored in the literature in the branch of society-oriented cryptography. Their particular properties make them suitable, as a potential cryptographic primitive, for broadcast communication and group-based applications. In this paper, we try to contribute to filling this gap by introducing several group-based one-time signature schemes of various versions: with proxy, with trusted party, and without trusted party.
引用
收藏
页码:123 / 136
页数:14
相关论文
共 50 条
  • [1] Efficient one-time proxy signatures
    Wang, HX
    Pieprzyk, J
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 507 - 522
  • [2] One-time proxy signatures revisited
    Bicakci, Kemal
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 499 - 505
  • [3] Efficient one-time proxy signatures
    Mehta, M
    Harn, L
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (02): : 129 - 133
  • [4] SHORT ONE-TIME SIGNATURES
    Zaverucha, Gregory M.
    Stinson, Douglas R.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2011, 5 (03) : 473 - 488
  • [5] Adding Linkability to Ring Signatures with One-Time Signatures
    Wang, Xueli
    Chen, Yu
    Ma, Xuecheng
    [J]. INFORMATION SECURITY, ISC 2019, 2019, 11723 : 445 - 464
  • [6] One-Time Traceable Ring Signatures
    Scafuro, Alessandra
    Zhang, Bihan
    [J]. COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 481 - 500
  • [7] One-Time Signatures and Chameleon Hash Functions
    Mohassel, Payman
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 302 - 319
  • [8] One-time proxy signature based on quantum cryptography
    Tian-Yin Wang
    Zong-Li Wei
    [J]. Quantum Information Processing, 2012, 11 : 455 - 463
  • [9] How to construct optimal one-time signatures
    Bicakci, K
    Tsudik, G
    Tung, B
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (03): : 339 - 349
  • [10] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016