YANG Xiaodong and WANG Caifen, “Threshold Proxy Re-signature Schemes in theStandard Model,” Chinese Journal of Electronics, vol. 19, no. 2, pp. 345-350, 2010,
Citation: YANG Xiaodong and WANG Caifen, “Threshold Proxy Re-signature Schemes in theStandard Model,” Chinese Journal of Electronics, vol. 19, no. 2, pp. 345-350, 2010,

Threshold Proxy Re-signature Schemes in theStandard Model

  • Received Date: 1900-01-01
  • Rev Recd Date: 1900-01-01
  • Publish Date: 2010-04-05
  • A (k; n) threshold proxy re-signature
    scheme distributes the re-signature key of the delegatee
    and the delegator. The re-signing ability to n proxies in
    a way that any set of k or more honest proxies can col-
    laborate to re-sign, while any set of k ¡ 1 proxies cannot.
    We propose two threshold proxy re-signature schemes with
    trust dealer, which are both proved secure in the standard
    model. Threshold proxy re-signature schemes are based on
    the Computational Di±e-Hellman (CDH) problem with-
    out random oracles. The schemes satisfy the properties
    of bidirectionality, non-interactivity, multi-use and private
    proxy. Meanwhile, the re-signature share generation and
    veri¯cation algorithms are non-interactive and e±cient.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1257) PDF downloads(1479) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return