Identity Based Threshold Proxy Signature
نویسندگان
چکیده
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In a (t, n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but t − 1 or less proxy signers cannot. In this paper, we present an ID-based threshold proxy signature scheme using bilinear pairings. We show the scheme satisfies all security requirements in the random oracle model. To the best of authors’ knowledge, our scheme is the first ID-based threshold proxy signature scheme. keywords: ID-based signatures, threshold proxy signatures, bilinear pairings.
منابع مشابه
An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
Proxy signature schemes have been invented to delegate signing rights. The paper proposes a new concept of Identify Based Strong Bi-Designated Verifier threshold proxy signature (ID-SBDVTPS) schemes. Such scheme enables an original signer to delegate the signature authority to a group of ‘n’ proxy signers with the condition that ‘t’ or more proxy signers can cooperatively sign messages on behal...
متن کاملAn ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...
متن کاملIdentity-Based Threshold Proxy Signature from Bilinear Pairings
Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate her signing capability to a group of n proxy signers, and it requires a consensus of t or more proxy signers in order to generate a valid signature. In addition to identity-based scheme, privacy protection for proxy singers and s...
متن کاملID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings
Multi-proxy signature allows the original signer delegate his singing power to a group of proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from several signers in a way that each signer learns neither the message nor the resulting signature. Plenty of multi-proxy signature and blind multisignature schemes have been proposed under the certificate-based (CA-...
متن کاملAn Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identitybased multi-proxy signature, proxy multi-signature and multi-proxy mult...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2004 شماره
صفحات -
تاریخ انتشار 2004