An improved threshold proxy signature scheme based on the RSA cryptosystem

Qingshui Xue, Zhenfu Cao, Feilong Tang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The proxy signature scheme, a variation of ordinary digital signature schemes, enables a proxy signer to sign messages on behalf of the original signer. In a (t, n) threshold proxy signature scheme, the original signer authorizes a proxy group with n proxy members. Only the cooperation of t or more proxy members is allowed to generate the proxy signature. Former threshold proxy signature schemes are all based on the difficulty of discrete logarithm. In 2003, for the first time, Hwang et al proposed a practical (t,n) threshold proxy signature scheme based on the difficulty of factoring the RSA modulus. By our observation, their scheme can't provide the properties of proxy protection, strong unforgeability, strong nonrepudiation, strong identifiability and known signers. To overcome their drawbacks, based on their scheme, we propose an improved version. The improved scheme provides the properties of not only proxy protection, strong unforgeability, strong identifiability and strong nonrepudiation, but also known signers.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04
EditorsH.R. Arabnia, J. Ni
Pages901-907
Number of pages7
StatePublished - 2004
Externally publishedYes
EventProceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04 - Las Vegas, NV, United States
Duration: 21 Jun 200424 Jun 2004

Publication series

NameProceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04
Volume2

Conference

ConferenceProceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04
Country/TerritoryUnited States
CityLas Vegas, NV
Period21/06/0424/06/04

Fingerprint

Dive into the research topics of 'An improved threshold proxy signature scheme based on the RSA cryptosystem'. Together they form a unique fingerprint.

Cite this