A Novel Hybrid Threshold Proxy Signature Scheme

Article Preview

Abstract:

In this paper, we propose a new type of threshold proxy signature scheme: hybrid threshold proxy signature (HTPS), in which a signature is cooperatively generated by the partial original signers themselves and the proxy signers on behalf of their own original signer in threshold proxy way. We formalize the notion of security for hybrid threshold proxy signature scheme and prove our schemes security, such as, distinguishability, verifiability, strong unforgeability, strong nonrepudiation, etc.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

4372-4376

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mambo M, Usuda K, and Okamoto E. Proxy signature: Delegation of the Power to sign messages. IEICE Trans. on Fundatamentals of Electronics, Communications and Computer Sciences 1996, E79-A(9): 1338-1354.

Google Scholar

[2] Zhang K. Threshold proxy signature schemes. In: Proceedings of the Information Security Workshop (ISW'97), Lecture Notes in Computer Science, Springer-Verlag, 1998, 1396: 282-290.

DOI: 10.1007/bfb0030429

Google Scholar

[3] S Kim, S Park, and D Won. Proxy signatures, revisited. In: Proceedings of the Information and Communications Security ( ICICS'97) , Lecture Notes in Computer Science, Springer-Verlag, 1997, 1334: 223-232.

DOI: 10.1007/bfb0028478

Google Scholar

[4] Sun H M, Lee N Y, and Hwang T. Threshold proxy signatures. IEE Proceedings-Computers and Digital Techniques, 1999, 146(5): 259-263.

DOI: 10.1049/ip-cdt:19990647

Google Scholar

[5] Zecheng Wang, Haifeng Qian, and Zhibin Li. Hybrid proxy multisignature: A new type multi-party signature. Information Sciences, 2007, 177(6): 5638–5650.

DOI: 10.1016/j.ins.2007.06.004

Google Scholar

[6] Hess F. Efficient identity based signature schemes based on pairings. Proceedings of Selected Areas in Cryptography 2002, Newfoundland, Canada, 2002, 310-324.

DOI: 10.1007/3-540-36492-7_20

Google Scholar