Undeniable Threshold Proxy Signature Scheme

被引:0
|
作者
Aboud, Sattar J. [1 ]
Yousef, Sufian [1 ]
Cole, Mike [2 ]
机构
[1] Anglia Ruskin Univ, TERG, Fac Sci & Technol, Cambridge, England
[2] Anglia Ruskin Univ, Fac Sci & Technol, Director Res, Cambridge, England
关键词
Cryptography; digital signature; proxy signature; threshold proxy signature; SIGNERS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluate a security of undeniable threshold proxy signature scheme with known signers. We find that the existing threshold proxy scheme is insecure versus the original signer forgery. We also demonstrate that a threshold proxy signature suffers from a conspiracy of an original signer and a secret share dealer, and that the scheme is commonly forgeable, and cannot offer undeniable scheme. We claim that the proposed scheme offers the undeniable characteristic.
引用
收藏
页码:150 / 153
页数:4
相关论文
共 50 条
  • [1] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [2] Threshold undeniable signature scheme based on conic
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 165 - 177
  • [3] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [4] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [5] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [6] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [7] Undeniable (t, n)-threshold signature scheme with cheater identification
    Lin, TY
    Wu, TC
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1998, 21 (06) : 775 - 780
  • [8] A secure threshold Paillier proxy signature scheme
    Pei-yih TING
    Chia-huei HSEU
    [J]. Frontiers of Information Technology & Electronic Engineering, 2010, (03) : 206 - 213
  • [9] Cryptanalysis and improvement of a threshold proxy signature scheme
    Hu, Jianghong
    Zhang, Jianzhong
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 169 - 173
  • [10] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213