Threshold proxy re-signature: definition and new constructions

被引:4
|
作者
Chen, Xi [1 ]
Liu, Yun [1 ]
Harn, Lein [2 ]
Li, Yong [1 ,3 ,4 ]
Yao, Ge [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Beijing, Peoples R China
[2] Univ Missouri, Sch Comp & Engn, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[5] Univ Melbourne, Sch Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Information security; cryptography; secret sharing; proxy re-signature; SCHEME; SECRET;
D O I
10.1080/02533839.2018.1437362
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [21] A New Transferable Digital Cash Protocol Using Proxy Re-signature Scheme
    Kavitha, M.
    Sunitha, N. R.
    Amberker, B. B.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 194 - +
  • [22] Proxy re-signature schemes without random oracles
    Shao, Jun
    Cao, Zhenfu
    Wang, Licheng
    Liang, Xiaohui
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 197 - 209
  • [23] SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
    Kanchan, Sneha
    Chaudhari, Narendra S.
    IEEE ACCESS, 2018, 6 : 59282 - 59295
  • [24] ID-based proxy re-signature without pairing
    Wang, Zhiwei
    Xia, Aidong
    He, Mingjun
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 217 - 222
  • [25] Message Authentication Scheme for VANET Based on Proxy Re-Signature
    Yang, Xiaodong
    An, Faying
    Yang, Ping
    Wu, Xiaobo
    Li, Yutong
    Xiao, Likun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [26] Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
    Li Huixian
    Han Zhipeng
    Wang Liqin
    Pang Liaojun
    IEEE ACCESS, 2018, 6 : 53869 - 53881
  • [27] Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems☆
    Zhang, Qiu
    Sun, Yinxia
    Lu, Yang
    Zhang, Guoqiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [28] Partial Blind Proxy Re-signature Scheme for Mobile Internet
    Lei, Yanfang
    Jia, Zhijuan
    Wang, Lipeng
    Gong, Bei
    Cheng, Yage
    Fu, Junjun
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 16 - 30
  • [29] A unidirectional certificateless proxy re-signature scheme based on lattice
    Zhou, YiHua
    Dong, SongShou
    Yang, YuGuang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [30] ID-based proxy re-signature without pairing
    Zhiwei Wang
    Aidong Xia
    Mingjun He
    Telecommunication Systems, 2018, 69 : 217 - 222