A (t,n) Threshold Proxy Signature Scheme with Specified Verifiers
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    concept of specified verifiers is first introduced into the threshold proxy signature, and a (t,n) threshold proxy signature scheme with the specified verifiers is proposed. In the proposed scheme, any t or more proxy signers can sign a message on behalf of an original signer for the specified verifiers, and only the specified verifiers together are able to verify the validity of the proxy signature. In ordinary (t,n) proxy threshold signature schemes, anyone can verify the validity of the proxy signature. In some applications, however, it is required that a proxy signature could be verified only by the specified verifiers together, that is, no a verifier can gain an advantage of the knowledge of the validity of the proxy signature before the other verifiers know its validity (e.g. tenders, bits). Furthermore, the proposed scheme can also revoke the proxy signature right of the proxy signers delegated by the original signer if original signer needs.

    Reference
    Related
    Cited by
Get Citation

王晓明,符方伟.指定验证人的(t,n)门限代理签名方案.软件学报,2005,16(6):1190-1196

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 26,2003
  • Revised:January 06,2004
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063