(t, k, l)-threshold proxy signature without random oracle

Research output: Contribution to journalArticlepeer-review

Abstract

To generalize the concept of (t, l)-threshold proxy signature scheme, this paper proposed a (t, k, l)-threshold proxy signature scheme, in which any k or more proxy signers in a designated proxy group of l members can cooperatively issue a proxy signature and this scheme can also tolerate at most t-1 corrupted signers. The security model of existential unforgeability for the threshold proxy signature scheme was presented, then a (t +1, 2t +1, l)-threshold proxy signature scheme based on the hardness of CDH problem was proposed, and the existential unforgeability was proved under this security model. At the same time, this scheme has the properties of distinguishability and proxy protected.

Original languageEnglish
Pages (from-to)1031-1036
Number of pages6
JournalShanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University
Volume44
Issue number8
StatePublished - Aug 2010
Externally publishedYes

Keywords

  • Bilinear pairings
  • Digital signature
  • Proxy
  • Threshold
  • Without random oracle

Fingerprint

Dive into the research topics of '(t, k, l)-threshold proxy signature without random oracle'. Together they form a unique fingerprint.

Cite this