Identity-based threshold signature and mediated proxy signature schemes

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:snwkq
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation . Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we found propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security signer signs according to the warrant, and check the revocation of a proxy signer. It is a proxy signer to generate valid proxy signatures is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to genera te a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation.
其他文献
  概述了办公计算机网络信息安全方案,简要介绍了网络信息安全以及存在的风险,并提出相应的预防方案,总结了方案办公自动化的特点,同时指出需要根据不同的工作性质和性质类型及
一说到营商环境,不少辽宁人就比较着急,免不了在网上和外地人争论几句.谁不想咱家乡好,埋汰谁谁都不高兴,这心情很正常,可以理解.自己挑缺点可以,别人说就不行,这是一种天然
期刊
  通过对网络时代医学信息检索的特点分析调查,介绍了国内外多个搜索引擎和医学数据库,并总结了网络信息检索的发展趋势。可见掌握正确的医学信息检索方法和步骤,对提高医务工
  概述了医学信息在中医药领域的应用,简要介绍了对医学信息学的历史回顾,综述了医学信息技术在中医领域、针灸经络及中医文献领域以及中药领域的应用,同时指明除了这几个方面
惠安玉石雕艺术是手工业时代形成的集实用与审美于一体的传统工艺产品,与机械生产相比,手工技艺性强,具有一定的艺术性.而在如今机械化智能生产的高科技时代,惠安玉石雕艺术
期刊
美国特工处,这是一个神秘的部门。特工处人员的职责是保护包括总统在内的美国政要,必要时,他们挺身而出,为总统挡子弹。在对特工处人员进行了100多次采访后,美国资深记者罗纳德·凯斯勒的新书《美国特工处揭秘》于8月4日正式面世,特工们眼中的美国总统,有喜有悲,也有自己的小秘密。    肯尼迪总统:不忠的丈夫    外人眼中的肯尼迪总统充满魅力,他总在微笑,尤其受女性青睐。肯尼迪的另一面,则是一个不计后果
中华民族上下五千年,拥有历史悠久、底蕴深厚的传统文化,十二生肖作为典型的中华传统文化烙印,是维系民族感情和文化的纽带,在国玉——和田玉的造型中有着非常广泛的应用.对
  阐述了基于任务驱动的医学信息学课程教学方案设计和实施的过程。通过对培养信息技术与医药学背景相结合的复合型人才知识特点分析,提出了课程设计、医院调研、查阅文献和
  从医学信息学的定义与内容、中国医学信息学会的发展简史、医学信息的专业教育、及医学信息学的课程教育与继续教育几个方面出发,谈谈我们对医学信息学教育的几点体会。
我国矿业的质量效益在技术建设和建设质量方面有了显著提高,但在采矿领域,地质灾害依然存在,不仅阻碍了工程的进展,而且还造成了一定的经济损失.本文介绍并讨论了地质灾害问