|
|
(t, k, l)-Threshold Proxy Signature Without Random Oracle
|
ZHANG Hai1,DONG Xiaolei1,CAO Zhenfu1,CAO Feng2 |
(1.Department of Computer Science & Engineering, Shanghai Jiaotong University, Shanghai 200240, China; 2.School of Mathematics and Information, Shanghai Lixin University of Commerce, Shanghai 201620, China )
|
|
|
Abstract To generalize the concept of (t,l)threshold proxy signature scheme, this paper proposed a (t, k, l)threshold proxy signature scheme, in which any k or more proxy signers in a designated proxy group of l members can cooperatively issue a proxy signature and this scheme can also tolerate at most t-1 corrupted signers. The security model of existential unforgeability for the threshold proxy signature scheme was presented, then a (t +1, 2t +1, l)threshold proxy signature scheme based on the hardness of CDH problem was proposed, and the existential unforgeability was proved under this security model. At the same time, this scheme has the properties of distinguishability and proxy protected.
|
Received: 26 December 2008
Published: 31 August 2010
|
|
|
|
|
[1] |
JIN Quan-a, GU Da-Wu-a, ZHAO Jian-Jie-b. Design and Optimized Implementation of Rainbow Table with GPU[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2011, 45(07): 1006-1011. |
[2] |
ZHANG Lei,CAO Zhenfu . An AttributeBased Encryption Scheme Suitable for Distributed Network [J]. J. Shanghai Jiaotong Univ.(Sci.) , 2010, 44(11): 1507-1512. |
[3] |
ZHANG Baowen1,LUO Zheng2,XUE Zhi1,YIN Ying1 . A Network Risk Assessment Model Based on Network Global Privilege Graph [J]. J. Shanghai Jiaotong Univ.(Sci.) , 2010, 44(09): 1197-1200. |
[4] |
CHEN Le,CAO Zhenfu. Approaches to Resisting LengthBased Attack[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2010, 44(07): 968-0974. |
[5] |
MA Rong,CAO Zhenfu. An Efficient and Full Secure IdentityBased Encryption Scheme [J]. J. Shanghai Jiaotong Univ.(Sci.) , 2010, 44(03): 389-0392. |
|
|
|
|