Threshold proxy re-signature

Research output: Contribution to journalArticlepeer-review

19 Scopus citations

Abstract

The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i. e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.

Original languageEnglish
Pages (from-to)816-824
Number of pages9
JournalJournal of Systems Science and Complexity
Volume24
Issue number4
DOIs
StatePublished - Aug 2011
Externally publishedYes

Keywords

  • Proxy re-signature
  • robust
  • threshold
  • unforgeable

Fingerprint

Dive into the research topics of 'Threshold proxy re-signature'. Together they form a unique fingerprint.

Cite this