Abstract
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement (“non-repudiation” property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger’s and Shao-Cao-Wang-Liang’s approach.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, EUROCRYPT, LNCS, 1998, 1403: 127–144.
G. Ateniese and S. Hohenberger, Proxy re-signatures: New definitions, algorithms, and applications, 12th ACM Conference on Computer and Communications Security, New York, 2005.
J. Shao, Z. F. Cao, L. C. Wang, and X. H. Liang, Proxy re-signature schemes without random oracles, INDOCRYPT, LNCS, 2007, 4859: 197–209.
B. Libert and D. Vergnaud, Multi-use unidirectional proxy re-signatures, 15th ACM Conference on Computer and Communications Security, New York, 2008.
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans. Inf. Syst. Secur., 2006, 9(1): 1–30.
R. Canetti and S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, 14th ACM Conference on Computer and Communications Security, New York, 2007.
M. Green and G. Ateniese, Identity-based proxy re-encryption, Applied Cryptography and Network Security, LNCS, 2007, 4521: 288–306.
G. Taban, A. A. C’ardenas, and V. D. Gligor, Towards a Secure and Interoperable DRM Architecture, ACM DRM, New York, 2006.
A. Shamir, How to share a secret, Communications of the ACM 1979, 22(11): 612–613.
D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, SIAM Journal of Computing, 2003, 32(3): 586–615.
R. Gennaro, S. Halevi, and T. Rabin, Secure hash-and-sign signatures without the random oracle, EUROCRYPT, LNCS, 1999, 1592: 123–139.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research is supported in part by the National Natural Science Foundation of China under Grant Nos. 61033014, 60970110, 60972034, and the National 973 Program under Grant No. 2007CB311201.
This paper was recommended for publication by Editor Xiao-Shan GAO.
Rights and permissions
About this article
Cite this article
Yang, P., Cao, Z. & Dong, X. Threshold proxy re-signature. J Syst Sci Complex 24, 816–824 (2011). https://doi.org/10.1007/s11424-011-8370-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-011-8370-3