Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

被引:0
|
作者
Raman Kumar
Harsh Kumar Verma
Renu Dhir
机构
[1] Dr B R Ambedkar National Institute of Technology,Department of Computer Science and Engineering
来源
关键词
Proxy signature; Threshold scheme; Lagrange coefficient; Secret sharing; Protocol for enhanced threshold proxy signature scheme; RSA cryptosystem for known signers;
D O I
暂无
中图分类号
学科分类号
摘要
Many threshold proxy signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this research paper, secret sharing proxy signature could permit the shares of designated signers, called proxy signers, renew their own proxy shares periodically without changing the secret. In particular, our scheme applies the (t, n) threshold proxy signature scheme and allows any t or more then t signers to form a designated group from n proxy signers to sign messages on behalf of the original signer. In the proposed scheme, furthermore, a proxy signer can recover his/her own share from t other proxy shares without revealing any information about other proxy shares. Unless more than t other proxy signers cooperate and collude, the secret share algorithm is always secure. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al. with the performance of a scheme that has been proposed by the authors of this article earlier. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.
引用
收藏
页码:1281 / 1345
页数:64
相关论文
共 50 条
  • [1] Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (03) : 1281 - 1345
  • [2] Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [3] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [4] Eliptic curve based threshold proxy signature scheme with known signers
    Institute of Mathematics, Warsaw University, Banacha 2, 02-097 Warszawa, Poland
    [J]. Fundam Inf, 2006, 4 (411-425):
  • [5] Analysis and Correction on a Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
    Sun, Fang
    Qi, Chuanda
    Niu, Lu
    Zhang, Yuna
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 176 - 179
  • [6] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [7] Eliptic curve based threshold proxy signature scheme with known signers
    Pomykala, Jacek
    Barabasz, Slawomir
    [J]. FUNDAMENTA INFORMATICAE, 2006, 69 (04) : 411 - 425
  • [8] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [9] An improved nonrepudiable threshold proxy signature scheme with known signers
    Liu, Xin
    Xu, Qiu-Liang
    Shang, Jiu-Qing
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 298 - +
  • [10] New nonrepudiable threshold proxy signature scheme with known signers
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 119 - 124