An efficient nonrepudiable threshold proxy signature scheme with known signers

被引:128
作者
Sun, HM [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng, Taichung County, Taiwan
关键词
cryptography; digital signature; proxy signature; threshold proxy signature;
D O I
10.1016/S0140-3664(99)00029-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. A threshold proxy signature scheme with the nonrepudiation property is a scheme with the capability that any verifier can identify the proxy group which is responsible for a proxy signature, while the proxy group cannot deny. So far, there have been two threshold proxy signature schemes proposed. Of these, Kim's scheme is nonrepudiable, but Zhang's scheme is not. Ln these two schemes, the t proxy signers from the group who actually sign the message are unknown and unidentified. This is very inconvenient for auditing purposes. For the responsibility of the actual signers and the traceability of adversarial signers, it is sometimes necessary to identify who the actual signers are. In this article, we propose the nonrepudiable threshold proxy signature scheme with known signers which is a nonrepudiable threshold proxy signature scheme with the property that the actual signers from the proxy group are known and identified. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:717 / 722
页数:6
相关论文
共 14 条
[1]  
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[2]  
Denning DER, 1983, CRYPTOGRAPHY DATA SE
[3]  
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[4]  
LEE NY, 1998, LECT NOTES COMPUTER, V1438, P415
[5]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[6]  
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[7]  
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]  
PEDERSEN TP, 1991, LECT NOTES COMPUT SC, V547, P221
[9]  
Rivest Ronald L., 1992, 1321 RFC
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613