Identity-based threshold signature and mediated proxy signature schemes

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:z178933143
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation.
其他文献
A newly developed pure rolling fatigue test rig with three contact points is used to test the rolling contact fatigue properties of silicon nitride ceramic ball
In the internet protocol(IP) over multi-granular optical switch network (IP/MG-OXC), the network node is a typical multilayer switch comprising several layers,
We investigated the influences of liquid water transfer property of cotton fabric on human physiological responses, such as ear canal temperature, heart rate, b
A variable-bit-rate characteristic waveform interpolation (VBR-CWI) speech codec with about 1.8kbit/s average bit rate which integrates phonetic classification
A new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets was presented, which was formulated as a noncooperative ga
Rough set theory is a new mathematical tool to deal with vagueness and uncertainty. But original rough sets theory only generates deterministic rules and deals
A new type oxidation resistance in situ Cr7C3/γ-Fe ceramic composite coating was fabricated on hardened and tempered grade C steel by reactive plasma clad with
In order to cool computer chip efficiently with the least noise, a single phase water-cooling radiator for computer chip driven by piezoelectric pump with two p
Aiming at the characteristics of modularity and reconfigurable in open architecture computer numerical control (CNC) system, the open architecture CNC system, H
A tracking method based on adaptive multiple cue fusion mechanism was presented, where particle filter is used to integrate color and edge cues. The fusion mech