A novel efficient (t, n) threshold proxy signature scheme

被引:47
作者
Huang, HF
Chang, CC [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Taichung Inst Technol, Dept Informat Management, Taichung 404, Taiwan
关键词
proxy signature; threshold proxy signature scheme; discrete logarithm; Lagrange interpolation;
D O I
10.1016/j.ins.2005.02.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
All previously proposed threshold proxy signature schemes have been based oil discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find Out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on Schnorr's scheme. Compared With existing (t,n) threshold proxy signature schemes, Our scheme can reduce the amount of computations and communications. In our method, not only the original signer can know who generated the proxy signature, but also the receiver can certify the actuality of the group signers who made the proxy signature. We offer convenience and fair distribution of auditing a document's signers. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:1338 / 1349
页数:12
相关论文
共 16 条
[1]  
[Anonymous], LECT NOTES COMPUTER
[2]   A FAIR PROTOCOL FOR SIGNING CONTRACTS [J].
BENOR, M ;
GOLDREICH, O ;
MICALI, S ;
RIVEST, RL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (01) :40-46
[3]   Improvement of threshold proxy signature scheme [J].
Hsu, Chien-Lung ;
Wu, Tzong-Sun ;
Wu, Tzong-Chen .
Applied Mathematics and Computation (New York), 2003, 136 (2-3) :315-321
[4]  
Hwang M S, 2000, INT J INFORMATICA, V11, P1
[5]  
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[6]  
Lee B, 2001, LECT NOTES COMPUT SC, V2119, P474
[7]  
LEE NY, 1998, LECT NOTES COMPUTER, V1438, P415
[8]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[9]  
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[10]  
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698