PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Previously, all of the proposed threshold proxy signature schemes which have been based on the discrete logarithms required a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to execute a lot of expensive modular exponential computations and communications to obtain and verify a shared secret. Thus, it is very time-consuming to construct the proxy signature. Moreover, some of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. In this paper, we proposed a practical, efficient, and low communications (t, n) threshold proxy signature scheme based on RSA cryptosystem. By using our way, not only the original signer can know who generated the proxy signature, but also everyone can be a verifier to certify the actuality of the group signers who made it. So, it is very convenient to clarify the responsibility of the document's signers fairly.
Wydawca
Rocznik
Strony
243--253
Opis fizyczny
bibliogr. 16 poz.
Twórcy
autor
autor
  • Department of Computer Science and Information Engineering, National Chung Cheng Uniersity, Chiayi, Taiwan, 621, R.O.C., Hfhuang.ccc@cs.ccu.edu.tw
Bibliografia
  • [1] Ben-Or, M., Goldreich, O., Micali, S., Rivest, R. L.: A fair protocol for signing contracts, IEEE Transactions on Information Theory, 36(1), 1990, 40-46.
  • [2] ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31(4), 1985, 469-472, 1985.
  • [3] Hwang, M.S., Lin, I.C., Lu, Eric J.L.: A secure nonrepudiable threshold proxy signature scheme with known signers, International Journal of Informatica, 11(2), 2000, 1-8.
  • [4] Hsu, C. L., Wu, T.S., Wu, T. C.: Improvement of threshold proxy signature scheme, Applied Mathematics and Computation, 136, 2003, 315-321.
  • [5] Hwang, M. S., Lu, Eric J. L., Lin, I. C.: A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, 2003, (To appear in IEEE Transactions on Knowledge and Data Engineering.).
  • [6] Kim, S., Park, S., Won, D.: Proxy signatures, revisited, Proc. of ICICS’97, LNCS 1334, Springer-Verlag, Berlin, 1991, 223-232.
  • [7] Lee, N.Y., Hwang, T.L. and Wang, C.H.: On Zhang’s nonrepudiable proxy signature schemes, Proc. of ACISP’98, LNCS1438, Springer-Verlag, Berlin, 1998, 415-422.
  • [8] B. Lee, H. Kim, and K. Kim, Secure mobile agent using strong non-designated proxy signature, Proc. of Information Security and Privacy, LNCS2119, Springer-Verlag, Berlin, 2001, 474-486.
  • [9] Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign message, IEICE Trans. Fundamentals, E79-A(9), 1996, 1338-1354.
  • [10] Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation, Proc. Third ACM Conf. on Computer and Communications Security, 1996, 48-57.
  • [11] Neuman, B.C.: Proxy-based authorization and accounting for distributed systems, Proc. 13th International Conference on Distributed Systems, 1993, 1283-291.
  • [12] Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 1978, 120-126.
  • [13] Sun, H. M.: An efficient nonrepudiable threshold proxy signature scheme with known signers, Computer Communications, 22(8), 1999, 717-722.
  • [14] Usuda, K., Mambo, M., Uyematsu, T., Okamoto, E.: Proposal of an automatic signature scheme using a compiler, IEICE Trans. Fundamentals, E79-A(1), 1996, 94-101.
  • [15] Varabharajan, V., Allen, P., Black, S.: An analysis of the proxy problem in distributed systems, Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, 225-275.
  • [16] Zhang, K.: Threshold proxy signature schemes, Proc. 1997 Workshop on Information Security , 1997, 191-197.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0004-0133
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.