Threshold proxy re-signature

被引:11
|
作者
Yang, Piyi [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; robust; threshold; unforgeable; ENCRYPTION;
D O I
10.1007/s11424-011-8370-3
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
引用
收藏
页码:816 / 824
页数:9
相关论文
共 50 条
  • [21] SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
    Kanchan, Sneha
    Chaudhari, Narendra S.
    IEEE ACCESS, 2018, 6 : 59282 - 59295
  • [22] ID-based proxy re-signature without pairing
    Wang, Zhiwei
    Xia, Aidong
    He, Mingjun
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 217 - 222
  • [23] Message Authentication Scheme for VANET Based on Proxy Re-Signature
    Yang, Xiaodong
    An, Faying
    Yang, Ping
    Wu, Xiaobo
    Li, Yutong
    Xiao, Likun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [24] Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
    Li Huixian
    Han Zhipeng
    Wang Liqin
    Pang Liaojun
    IEEE ACCESS, 2018, 6 : 53869 - 53881
  • [25] Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems☆
    Zhang, Qiu
    Sun, Yinxia
    Lu, Yang
    Zhang, Guoqiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [26] Partial Blind Proxy Re-signature Scheme for Mobile Internet
    Lei, Yanfang
    Jia, Zhijuan
    Wang, Lipeng
    Gong, Bei
    Cheng, Yage
    Fu, Junjun
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 16 - 30
  • [27] A unidirectional certificateless proxy re-signature scheme based on lattice
    Zhou, YiHua
    Dong, SongShou
    Yang, YuGuang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [28] ID-based proxy re-signature without pairing
    Zhiwei Wang
    Aidong Xia
    Mingjun He
    Telecommunication Systems, 2018, 69 : 217 - 222
  • [29] A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another
    Chaudhari, Shilpa
    Aparna, R.
    Rane, Archana
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 24 - 49
  • [30] Partially blind proxy re-signature scheme with proven security
    Yang X.
    Chen C.
    Yang P.
    An F.
    Ma T.
    Wang C.
    2018, Editorial Board of Journal on Communications (39): : 61 - 68