An improved threshold proxy signature scheme based on the RSA cryptosystem

被引:0
|
作者
Xue, QS [1 ]
Cao, ZF [1 ]
Tang, FL [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proxy signature scheme, a variation of ordinary digital signature schemes, enables a proxy signer to sign messages on behalf of the original signer. In a (t, n) threshold proxy signature scheme, the original signer authorizes a proxy group with n proxy members. Only the cooperation of I or more proxy members is allowed to generate the proxy signature. Former threshold proxy signature schemes are all based on the difficulty of discrete logarithm. In 2003, for the first time, Hwang et al proposed a practical (t,n) threshold proxy signature scheme based on the difficulty of factoring the RSA modulus. By our observation, their scheme can't provide the properties of proxy protection, strong unforgeability, strong nonrepudiation, strong identifiability and known signers. To overcome their drawbacks, based on their scheme, we propose an improved version. The improved scheme provides the properties of not only proxy protection, strong unforgeability, strong identiflability and strong nonrepudiation, but also known signers.
引用
收藏
页码:901 / 907
页数:7
相关论文
共 50 条
  • [1] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [2] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [3] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [4] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [5] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [6] Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1309 - 1311
  • [7] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [8] AN IMPROVED (t, n) THRESHOLD PROXY SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON RSA
    Zhang, Ying
    Yue, Dian-Wu
    Zhang, Huisheng
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (07): : 3205 - 3218
  • [9] A modified and practical threshold proxy signature scheme based on RSA
    Geng Yong-Jun
    Tian Hui
    Hong Fan
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +
  • [10] Crypanalysis of kuo and chen's threshold proxy signature scheme based on the RSA
    Li, Fengying
    Xue, Qingshui
    Cao, Zhenfu
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 815 - +