Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

被引:0
|
作者
Raman Kumar
Harsh Kumar Verma
Renu Dhir
机构
[1] Dr B R Ambedkar National Institute of Technology,Department of Computer Science and Engineering
来源
关键词
Proxy signature; Threshold scheme; Lagrange coefficient; Secret sharing; Protocol for enhanced threshold proxy signature scheme; RSA cryptosystem for known signers;
D O I
暂无
中图分类号
学科分类号
摘要
Many threshold proxy signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this research paper, secret sharing proxy signature could permit the shares of designated signers, called proxy signers, renew their own proxy shares periodically without changing the secret. In particular, our scheme applies the (t, n) threshold proxy signature scheme and allows any t or more then t signers to form a designated group from n proxy signers to sign messages on behalf of the original signer. In the proposed scheme, furthermore, a proxy signer can recover his/her own share from t other proxy shares without revealing any information about other proxy shares. Unless more than t other proxy signers cooperate and collude, the secret share algorithm is always secure. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al. with the performance of a scheme that has been proposed by the authors of this article earlier. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.
引用
收藏
页码:1281 / 1345
页数:64
相关论文
共 50 条
  • [41] Fair exchange protocol based on RSA signature scheme
    Zhou, Yong-Bin
    Zhang, Zhen-Feng
    Qing, Si-Han
    Ji, Qing-Guang
    [J]. Ruan Jian Xue Bao/Journal of Software, 2004, 15 (07): : 1049 - 1055
  • [42] The security analysis of a threshold proxy quantum signature scheme
    Shi JianHong
    Zhang ShengLi
    Chang ZhengGang
    [J]. SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2013, 56 (03) : 519 - 523
  • [43] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    [J]. Science China(Physics,Mechanics & Astronomy), 2013, Mechanics & Astronomy)2013 (03) : 519 - 523
  • [44] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    [J]. Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523
  • [45] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [46] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [47] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [48] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
  • [49] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [50] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153