{"title":"A new forward-secure threshold proxy re-signature scheme","authors":"Xiaodong Yang, Caifen Wang, Yulei Zhang, Weiyi Wei","doi":"10.1109/ICNIDC.2009.5360842","DOIUrl":null,"url":null,"abstract":"A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time. It implies that past proxy re-signatures remain secure if the current re-signature key is leaked. The scheme is provably robust, forward-secure and unforgettable without relying on the random oracle model. The scheme has many attractive applications, such as the construction of the interoperable system of digital rights management (DRM).","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Network Infrastructure and Digital Content","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNIDC.2009.5360842","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time. It implies that past proxy re-signatures remain secure if the current re-signature key is leaked. The scheme is provably robust, forward-secure and unforgettable without relying on the random oracle model. The scheme has many attractive applications, such as the construction of the interoperable system of digital rights management (DRM).