An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem

被引:0
|
作者
Wang, Yuping [1 ]
Hu, Lishuan [1 ]
Yu, Xin [1 ]
机构
[1] Beijing Union Univ, Coll Automat, Beijing 100101, Peoples R China
关键词
Conspiracy attack; Digital signature; RSA Cryptosystem; Threshold proxy signature;
D O I
10.1109/CCCM.2009.5267540
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A (t,n) threshold proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. Hwang et al. recently proposed an practical (t, n) threshold proxy signature scheme. In this paper we propose an efficient threshold proxy signature scheme based on RSA signature scheme, which improves security of their scheme. Our scheme divides the document M into m blocks and add some redundant bits to each message block. It is embedded in the proxy signature issuing phase to avoid the conspiracy attack. The proposed signature scheme satisfies all the secure requirements and is efficient.
引用
收藏
页码:567 / 570
页数:4
相关论文
共 50 条
  • [1] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [2] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [3] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [4] Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1309 - 1311
  • [5] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [6] AN IMPROVED (t, n) THRESHOLD PROXY SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON RSA
    Zhang, Ying
    Yue, Dian-Wu
    Zhang, Huisheng
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (07): : 3205 - 3218
  • [7] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [8] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [9] An RSA-based (t, n) threshold proxy signature scheme without any trusted combiner
    Ting, Pei-yih
    Huang, Xiao-Wei
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 277 - 284
  • [10] A modified and practical threshold proxy signature scheme based on RSA
    Geng Yong-Jun
    Tian Hui
    Hong Fan
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +