TY - GEN
T1 - Threshold proxy re-signature
AU - Yang, Piyi
AU - Cao, Zhenfu
AU - Dong, Xiaolei
PY - 2008
Y1 - 2008
N2 - The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in proxy re-signature schemes, i.e., the proxy knows the user's private key, which damages the essential requirement - "non-repudiation" property of proxy re-signature schemes. In this paper, we first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese's [1] and Shao Jun's [6] approach. To our knowledge, there is no threshold proxy re-signature scheme that has been formally presented yet.
AB - The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in proxy re-signature schemes, i.e., the proxy knows the user's private key, which damages the essential requirement - "non-repudiation" property of proxy re-signature schemes. In this paper, we first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese's [1] and Shao Jun's [6] approach. To our knowledge, there is no threshold proxy re-signature scheme that has been formally presented yet.
UR - https://www.scopus.com/pages/publications/62849100979
U2 - 10.1109/PCCC.2008.4745095
DO - 10.1109/PCCC.2008.4745095
M3 - 会议稿件
AN - SCOPUS:62849100979
SN - 9781424433674
T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
SP - 450
EP - 455
BT - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
T2 - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Y2 - 7 December 2008 through 9 December 2008
ER -