跳到主要导航 跳到搜索 跳到主要内容

Threshold proxy re-signature

科研成果: 期刊稿件文章同行评审

摘要

The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i. e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.

源语言英语
页(从-至)816-824
页数9
期刊Journal of Systems Science and Complexity
24
4
DOI
出版状态已出版 - 8月 2011
已对外发布

指纹

探究 'Threshold proxy re-signature' 的科研主题。它们共同构成独一无二的指纹。

引用此