Undeniable Threshold Proxy Signature Scheme

被引:0
|
作者
Aboud, Sattar J. [1 ]
Yousef, Sufian [1 ]
Cole, Mike [2 ]
机构
[1] Anglia Ruskin Univ, TERG, Fac Sci & Technol, Cambridge, England
[2] Anglia Ruskin Univ, Fac Sci & Technol, Director Res, Cambridge, England
关键词
Cryptography; digital signature; proxy signature; threshold proxy signature; SIGNERS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluate a security of undeniable threshold proxy signature scheme with known signers. We find that the existing threshold proxy scheme is insecure versus the original signer forgery. We also demonstrate that a threshold proxy signature suffers from a conspiracy of an original signer and a secret share dealer, and that the scheme is commonly forgeable, and cannot offer undeniable scheme. We claim that the proposed scheme offers the undeniable characteristic.
引用
收藏
页码:150 / 153
页数:4
相关论文
共 50 条
  • [41] The Insecurity of a Certificateless Undeniable Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    [J]. 2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 582 - 587
  • [42] An undeniable signature scheme based on lattice
    [J]. Li, S. (lishuang@th.btbu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04):
  • [43] Optimization of the MOVA undeniable signature scheme
    Monnerat, J
    Oswald, YA
    Vaudenay, S
    [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 196 - 209
  • [44] An efficient certificateless undeniable signature scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (07) : 1313 - 1328
  • [45] Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme
    Shao, Zuhua
    [J]. FUNDAMENTA INFORMATICAE, 2010, 104 (04) : 385 - 392
  • [46] A new threshold proxy signature scheme from bilinear pairings
    Qian, HF
    Cao, ZF
    Xue, QS
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (05): : 612 - 622
  • [47] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [48] A new threshold proxy signature scheme from bilinear pairings
    Haifeng Qian
    Zhenfu Cao
    Qingshui Xue
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 612 - 622
  • [49] A novel non-repudiable threshold proxy signature scheme
    Zhang, Zhong
    Jiang, Han
    Xu, Qiu-Liang
    Chen, Tzer-Shyong
    [J]. WSEAS Transactions on Communications, 2007, 6 (04): : 643 - 649
  • [50] A novel efficient (t, n) threshold proxy signature scheme
    Huang, HF
    Chang, CC
    [J]. INFORMATION SCIENCES, 2006, 176 (10) : 1338 - 1349