期刊文献+

A new threshold proxy signature scheme from bilinear pairings 被引量:7

A new threshold proxy signature scheme from bilinear pairings
原文传递
导出
摘要 Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof.Then a new threshold proxy signature from bilinear pairings is proposed as well by us ing the new probabilistic signature scheme and the properties of the Gap Diffie-Hellman (GDH)group (where the Computational Diffie-Hellman problem is hard but the Decisional Diffie-Hellman problem is easy to solve).Our constructions are based on the recently proposed GDH signature scheme of Bonel et al.s article.Bilinear pairings could be built from Weil pairing or Tate pairing.So most our constructions would be simpler,but still with high security.The proposed threshold proxy signature is the first one which is built from bilinear pairings.At the end of this paper security and performance of the threshold proxy signature scheme is also analyzed.
出处 《Science in China(Series F)》 2004年第5期612-622,共11页 中国科学(F辑英文版)
关键词 probabilistic signature scheme threshold proxy signature VSS bilinear pairings. probabilistic signature scheme,threshold proxy signature,VSS,bilinear pairings.
  • 相关文献

参考文献2

二级参考文献49

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献64

同被引文献30

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部