An ECDLP-based threshold proxy signature scheme using self-certified public key system

  • Qingshui Xue*
  • , Fengying Li
  • , Yuan Zhou
  • , Jiping Zhang
  • , Zhenfu Cao
  • , Haifeng Qian
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In a (t, n) threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can't cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates, which have some disadvantages such as checking the certificate list when needing certificates. Most threshold proxy signature schemes use Shamir's threshold secret share scheme. Identity-based public key system is not pretty mature. Self-certified public key systems have attracted more and more attention because of its advantages. Based on Hsu et al's self-certified public key system and Li et al's proxy signature scheme, one threshold proxy signature scheme based on ECDLP and self-certified public key system is proposed. As far as we know, it is the first scheme based on ECDLP and self-certified public key system. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability, known signers and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted. In the proxy signature verification phase, the authentication of the original and the proxy signers' public keys and the verification of the threshold proxy signature are executed together. In addition, the computation overhead and communication cost of the proposed scheme are analyzed as well.

Original languageEnglish
Title of host publicationSecurity and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009, Revised Selected Papers
Pages58-70
Number of pages13
DOIs
StatePublished - 2009
Event1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, MobiSec 2009 - Turin, Italy
Duration: 3 Jun 20095 Jun 2009

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume17 LNICST
ISSN (Print)1867-8211

Conference

Conference1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, MobiSec 2009
Country/TerritoryItaly
CityTurin
Period3/06/095/06/09

Fingerprint

Dive into the research topics of 'An ECDLP-based threshold proxy signature scheme using self-certified public key system'. Together they form a unique fingerprint.

Cite this