摘要
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i. e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
| 源语言 | 英语 |
|---|---|
| 页(从-至) | 816-824 |
| 页数 | 9 |
| 期刊 | Journal of Systems Science and Complexity |
| 卷 | 24 |
| 期 | 4 |
| DOI | |
| 出版状态 | 已出版 - 8月 2011 |
| 已对外发布 | 是 |
指纹
探究 'Threshold proxy re-signature' 的科研主题。它们共同构成独一无二的指纹。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver