Threshold Proxy Signature Scheme with Strong Real-Time Efficiency

Xiaoming Wang, Huoyan Chen
{"title":"Threshold Proxy Signature Scheme with Strong Real-Time Efficiency","authors":"Xiaoming Wang, Huoyan Chen","doi":"10.1109/IAS.2008.8","DOIUrl":null,"url":null,"abstract":"The threshold proxy signature scheme with strong real-time efficiency is proposed based on a trapdoor hash function and the sharing secret technology. In the scheme, the procedure of generating threshold proxy signature is performed in two phases. The off-line phase generates a threshold proxy pre-signature before the message to be signed is even known. The pre-signature is independent of the particular message to be signed and is stored for future in the on-line phase. While on-line phase generates quickly a threshold proxy signature using the pre-signature once the message to be signed is presented. The on-line phase is typically very fast and strong real-time efficiency since it only needs a few modular additions and multiplications and one round of communication among proxy signers. Furthermore, the scheme not only has strong real-time efficiency, but also withstands the conspiracy attack existed in the previous schemes and requires no trusted third party. The scheme is particularly useful for requiring the strong real-time efficiency and fully distributed networks such as electric wallet or smart cards etc.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2008.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The threshold proxy signature scheme with strong real-time efficiency is proposed based on a trapdoor hash function and the sharing secret technology. In the scheme, the procedure of generating threshold proxy signature is performed in two phases. The off-line phase generates a threshold proxy pre-signature before the message to be signed is even known. The pre-signature is independent of the particular message to be signed and is stored for future in the on-line phase. While on-line phase generates quickly a threshold proxy signature using the pre-signature once the message to be signed is presented. The on-line phase is typically very fast and strong real-time efficiency since it only needs a few modular additions and multiplications and one round of communication among proxy signers. Furthermore, the scheme not only has strong real-time efficiency, but also withstands the conspiracy attack existed in the previous schemes and requires no trusted third party. The scheme is particularly useful for requiring the strong real-time efficiency and fully distributed networks such as electric wallet or smart cards etc.
实时性强的阈值代理签名方案
提出了一种基于陷阱门哈希函数和共享秘密技术的实时性强的阈值代理签名方案。在该方案中,门限代理签名的生成过程分两个阶段进行。脱机阶段甚至在知道要签名的消息之前生成阈值代理预签名。预签名独立于要签名的特定消息,并存储在联机阶段以备将来使用。在在线阶段,一旦要签名的消息出现,就使用预签名快速生成阈值代理签名。在线阶段通常是非常快速和强大的实时效率,因为它只需要一些模块化的加法和乘法以及代理签署者之间的一轮通信。此外,该方案不仅具有较强的实时性,而且能够抵御以往方案中存在的合谋攻击,不需要可信的第三方。该方案特别适用于要求实时性强、要求全分布式的网络,如电子钱包、智能卡等。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信