Generalization of Proxy Signature Based on Factorization

نویسندگان

  • Cheng-Chi Lee
  • Tzu-Chun Lin
  • Shiang-Feng Tzeng
  • Min-Shiang Hwang
چکیده

A rich set of proxy signature schemes have been widely researched and discussed so far. However, they have been mainly focusing on dealing with one or two separate proxy situations each. In this article, the authors proposed the generalization of the (t1/n1 − t2/n2) proxy signature scheme based on the factorization of the square root modulo of a composite number. This scheme can be applied to every proxy situation. The (t1/n1 − t2/n2) proxy signature scheme allows the original group of original signers to delegate their signing capability to a designated proxy group of proxy signers. Any verifier can verify the proxy signatures on the messages with the knowledge of the identities of the actual original signers and the actual proxy signers. Furthermore, all possible attacks that have been analyzed so far have failed to break the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues

The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...

متن کامل

A New Proxy Blind Signature Scheme based on ECDLP

A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature, blind signature and multi-signature scheme and satisfies the security properties of both proxy and blind signature scheme. ...

متن کامل

Secure Delegation of Signing Power from Factorization

Delegation of signing is a working way common in oce automation work, and is also an important approach to establish trust. Proxy signature is an important cryptographic primitive for delegating the signing powers and it has found many real world applications. The existing proxy signature schemes from factorization assumption are either insecure or inecient. In this paper, we propose a novel, e...

متن کامل

Proxy Signature Scheme Based on Isomorphisms of Polynomials

Proxy signatures are important cryptosystems that are widely adopted in different applications. Most of the proxy signature schemes so far are based on the hardness of integer factoring, discrete logarithm, and/or elliptic curve. However, Peter Shor proved that the emerging quantum computers can solve the problem of prime factorization and discrete logarithm in polynomial time, which threatens ...

متن کامل

Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010