Threshold proxy re-signature: definition and new constructions

被引:4
|
作者
Chen, Xi [1 ]
Liu, Yun [1 ]
Harn, Lein [2 ]
Li, Yong [1 ,3 ,4 ]
Yao, Ge [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Beijing, Peoples R China
[2] Univ Missouri, Sch Comp & Engn, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[5] Univ Melbourne, Sch Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Information security; cryptography; secret sharing; proxy re-signature; SCHEME; SECRET;
D O I
10.1080/02533839.2018.1437362
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [31] A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another
    Chaudhari, Shilpa
    Aparna, R.
    Rane, Archana
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 24 - 49
  • [32] Partially blind proxy re-signature scheme with proven security
    Yang X.
    Chen C.
    Yang P.
    An F.
    Ma T.
    Wang C.
    2018, Editorial Board of Journal on Communications (39): : 61 - 68
  • [33] ID-based Proxy Re-signature with Aggregate Property
    Wang, Zhi-Wei
    Xia, Ai-Dong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (04) : 1199 - 1211
  • [34] A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments
    Yang, Xiao-Dong
    Xiao, Li-Kun
    Chen, Chun-Lin
    Wang, Cai-Fen
    SYMMETRY-BASEL, 2018, 10 (11):
  • [35] Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications
    Wei, Jiannan
    Yang, Guomin
    Mu, Yi
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3017 - 3030
  • [36] Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications
    Jiannan Wei
    Guomin Yang
    Yi Mu
    Wireless Personal Communications, 2017, 97 : 3017 - 3030
  • [37] A multi-use unidirectional certificateless proxy re-signature scheme
    Wu, Yan
    Xiong, Hu
    Jin, Chuanjie
    TELECOMMUNICATION SYSTEMS, 2020, 73 (03) : 455 - 467
  • [38] Universally composable secure proxy re-signature scheme with effective calculation
    Xuan Hong
    Jianhua Gao
    Jianguo Pan
    Bo Zhang
    Cluster Computing, 2019, 22 : 10075 - 10084
  • [39] A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETs
    Hong, Xuan
    Long, Yu
    JOURNAL OF COMPUTERS, 2012, 7 (07) : 1796 - 1800
  • [40] Non-interactive conditional proxy re-signature in the standard model
    Lee E.
    Kim S.W.
    Lee, Eunsung (eslee10@postech.ac.kr), 1772, Oxford University Press (61): : 1772 - 1782