期刊文献+

THRESHOLD PROXY RE-SIGNATURE 被引量:7

THRESHOLD PROXY RE-SIGNATURE
原文传递
导出
摘要 The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页 系统科学与复杂性学报(英文版)
基金 supported in part by the National Natural Science Foundation of China under Grant Nos. 61033014,60970110,60972034 the National 973 Program under Grant No.2007CB311201
关键词 Proxy re-signature ROBUST THRESHOLD unforgeable. 门限代理签名 签名方案 安全模型 不可抵赖性 用户 密钥 信任
  • 相关文献

参考文献11

  • 1M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, EU- ROCRYPT, LNCS, 1998, 1403: 127-144. 被引量:1
  • 2G. Ateniese and S. Hohenberger, Proxy re-signatures: New definitions, algorithms, and applica- tions, 12th ACM Conference on Computer and Communications Security, New York, 2005. 被引量:1
  • 3J. Shao, Z. F. Cao, L. C. Wang, and X. H. Liang, Proxy re-signature schemes without random oracles, INDOCRYPT, LNCS, 2007, 4859: 197-209. 被引量:1
  • 4B. Libert and D. Vergnaud, Multi-use unidirectional proxy re-signatures, 15th ACM Conference on Computer and Communications Security, New York, 2008. 被引量:1
  • 5G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans. Inf. Syst. Secur., 2006, 9(1): 1-30. 被引量:1
  • 6R. Canetti and S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, 14th A CM Confer- ence on Computer and Communications Security, New York, 2007. 被引量:1
  • 7M. Green and G. Ateniese, Identity-based proxy re-encryption, Applied Cryptography and Network Security, LNCS, 2007, 4521: 288-306. 被引量:1
  • 8G. Taban, A. A. C'ardenas, and V. D. Gligor, Towards a Secure and Interoperable DRM Architec- ture, ACM DRM, New York, 2006. 被引量:1
  • 9A. Shamir, How to share a secret, Communications of the ACM 1979, 22(11): 612-613. 被引量:1
  • 10D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, SIAM Journal of Computing, 2003, 32(3): 586-615. 被引量:1

同被引文献23

  • 1Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]//International Conference on the Theory and Application of Cryptographic Techniques.Berlin:Springer-Verlag,1998:127-144. 被引量:1
  • 2Ateniese G,Hohenberger S.Proxy Re-Signatures:New definitions,algorithms,and applications[C]//Proceedings of the ACM Conference on CCS.New York:ACM,2005:310-319. 被引量:1
  • 3Shao Jun,Cao Zhenfu,Wang Licheng,et al.Proxy Re-signature Schemes without Random Oracles[C]//Proceedings of Indecrypt 2007,LNCS 4859.Heidelberg:Springer-Verlag,2007:197-209. 被引量:1
  • 4Libert B,Vergnaud D.Multi-Use Unidirectional Proxy Re-Signatures[C]//Proceedings of the ACM Conference on CCS.New York:ACM,2008:511-520. 被引量:1
  • 5Shao Jun,Wei Guiyi,Ling Yun,et al.Unidirectional Identity-based Proxy re-signature[C]//Proceedings of the IEEE International Conference on Communications.Piscataway:IEEE,2011:1-5. 被引量:1
  • 6Gentry C,Peikert C,Vaikuntanathan V.Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//Proceedings of the Annual ACM Symposium on Theory of Computing.New York:ACM,2008:197-206. 被引量:1
  • 7Lyubashevsky V.Lattice Signatures without Trapdoors[C]//Proceedings of Eurocrypt 2012,LNCS 7237.Heidelberg:Springer-Verlag,2012:738-755. 被引量:1
  • 8Xagawa K.Cryptography with Lattices[D].Tokyo:Tokyo Institute of Technology,2010. 被引量:1
  • 9Alwen J,Peiker C.Generating Shorter Bases for Hard Random Lattices[J].Theory of Computing Systems,2011,48(3):535-553. 被引量:1
  • 10Micciancio D,Regev O.Worst-case to Average-case Reductions Based on Gaussian Measures[J].SIAM Journal Computer,2007,37(1):267-302. 被引量:1

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部