TY - JOUR
T1 - A threshold proxy signature scheme using self-certified public keys
AU - Xue, Qingshui
AU - Cao, Zhenfu
PY - 2004
Y1 - 2004
N2 - So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir's threshold secret share scheme. Self-certified public key system has attracted more and more attention because of its advantages. Based on Hsu et al's self-certified public key system and Li et al's proxy signature scheme, one threshold proxy signature scheme is proposed. The new scheme can provide the properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability, known signers and prevention of misuse. In the proxy signature verification phase, the authentication of original and proxy signers' public keys and the verification of the threshold proxy signature are executed together. In addition, the computation overhead and communication cost of the scheme are less than previous works with Shamir's secret share protocol and the public key system based on certificates.
AB - So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir's threshold secret share scheme. Self-certified public key system has attracted more and more attention because of its advantages. Based on Hsu et al's self-certified public key system and Li et al's proxy signature scheme, one threshold proxy signature scheme is proposed. The new scheme can provide the properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability, known signers and prevention of misuse. In the proxy signature verification phase, the authentication of original and proxy signers' public keys and the verification of the threshold proxy signature are executed together. In addition, the computation overhead and communication cost of the scheme are less than previous works with Shamir's secret share protocol and the public key system based on certificates.
UR - https://www.scopus.com/pages/publications/33744898762
U2 - 10.1007/978-3-540-30566-8_83
DO - 10.1007/978-3-540-30566-8_83
M3 - 文章
AN - SCOPUS:33744898762
SN - 0302-9743
VL - 3358
SP - 715
EP - 724
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
ER -