Skip to main content

A Threshold Proxy Signature Scheme Using Self-Certified Public Keys

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3358))

Abstract

So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir’s threshold secret share scheme. Self-certified public key system has attracted more and more attention because of its advantages. Based on Hsu et al’s self-certified public key system and Li et al’s proxy signature scheme, one threshold proxy signature scheme is proposed. The new scheme can provide the properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability, known signers and prevention of misuse. In the proxy signature verification phase, the authentication of original and proxy signers’ public keys and the verification of the threshold proxy signature are executed together. In addition, the computation overhead and communication cost of the scheme are less than previous works with Shamir’s secret share protocol and the public key system based on certificates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature for Delegating Signing Operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)

    Chapter  Google Scholar 

  2. Li, J.G., Cao, Z.F.: Improvement of a Threshold Proxy Signature Scheme. Journal of Computer Research and Development 9(11), 515-518 (2002) (in Chinese)

    Google Scholar 

  3. Li, J.G., Cao, Z.F., Zhang, Y.C.: Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology (New Series) 9(2), 145–148 (2002)

    Google Scholar 

  4. Li, J.G., Cao, Z.F., Zhang, Y.C.: Nonrepudiable Proxy Multi-signature Scheme. Journal of Computer Science and Technology 18(3), 399–402 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  5. Li, J.G., Cao, Z.F., Zhang, Y.C., Li, J.Z.: Cryptographic Analysis and Modification of Proxy Multi-signature Scheme. High Technology Letters 13(4), 1–5 (2003) (in Chinese)

    MATH  MathSciNet  Google Scholar 

  6. Hsu, C.L., Wu, T.S., Wu, T.C.: New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. The Journal of Systems and Software 58, 119–124 (2001)

    Article  Google Scholar 

  7. Hwang, M.S., Lin, I.C., Lu Eric, J.L.: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. INFORMATICA 11(2), 1–8 (2000)

    Google Scholar 

  8. Hwang, S.J., Chen, C.C.: Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. INFORMATICA 14(2), 205–212 (2003)

    MATH  MathSciNet  Google Scholar 

  9. Sun, H.M.: An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Computer Communications 22(8), 717–722 (1999)

    Article  Google Scholar 

  10. Sun, H.M., Lee, N.Y., Hwang, T.: Threshold Proxy Signature. IEEE Proceedings-computers & Digital Techniques 146(5), 259–263 (1999)

    Article  Google Scholar 

  11. Zhang, K.: Threshold Proxy Signature Schemes. In: Information Security Workshop, Japan, pp. 191–197 (1997)

    Google Scholar 

  12. Hsu, C.L., Wu, T.S., Wu, T.C.: Improvement of Threshold Proxy Signature Scheme. Applied Mathematics and Computation 136, 315–321 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  13. Tsai, C.S., Tzeng, S.F., Hwang, M.S.: Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. INFORMATICA 14(3), 393–402 (2003)

    MATH  MathSciNet  Google Scholar 

  14. Xue, Q.S., Cao, Z.F.: On Two Nonrepudiable Threshold Proxy Signature Schemes with Known Signers. INFORMATICA (to appear)

    Google Scholar 

  15. Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley, Reading (1983)

    Google Scholar 

  16. Pedersen, T.: Distributed Provers with Applications to Undeniable Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)

    Google Scholar 

  17. Li, L.H., Tzeng, S.F., Hwang, M.S.: Generalization of proxy signature-based on discrete logarithms. Computers & Security 22(3), 245–255 (2003)

    Article  Google Scholar 

  18. Hsu, C.L., Wu, T.S.: Efficient proxy signature schemes using self-certified public keys. Applied Mathematics and Computation, Corrected Proof, Available online 9 (2003) (in press)

    Google Scholar 

  19. Hwang, M.S., Tzeng, S.F., Tsai, C.S.: Generalization of proxy signature based on elliptic curves. Computer Standards & Interfaces 26(2), 73–84 (2004)

    Article  Google Scholar 

  20. Girault, M.: Selt-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 491–497. Springer, Heidelberg (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xue, Q., Cao, Z. (2004). A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds) Parallel and Distributed Processing and Applications. ISPA 2004. Lecture Notes in Computer Science, vol 3358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30566-8_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30566-8_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24128-7

  • Online ISBN: 978-3-540-30566-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics