ID-based efficient and proactive threshold proxy signature in the standard model

The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly ver...

Full description

Saved in:
Bibliographic Details
Main Authors: YU Yi-ke1, ZHENG Xue-feng2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419804/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537830964166656
author YU Yi-ke1
ZHENG Xue-feng2
author_facet YU Yi-ke1
ZHENG Xue-feng2
author_sort YU Yi-ke1
collection DOAJ
description The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.
format Article
id doaj-art-d3b13caf78314e3cb08f7511cb75924c
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d3b13caf78314e3cb08f7511cb75924c2025-01-14T08:22:29ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132556374419804ID-based efficient and proactive threshold proxy signature in the standard modelYU Yi-ke1ZHENG Xue-feng2The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.http://www.joconline.com.cn/zh/article/74419804/proactive threshold proxy signaturestandard modelidentity based cryptographycomputational Dif-fie-Hellman problem
spellingShingle YU Yi-ke1
ZHENG Xue-feng2
ID-based efficient and proactive threshold proxy signature in the standard model
Tongxin xuebao
proactive threshold proxy signature
standard model
identity based cryptography
computational Dif-fie-Hellman problem
title ID-based efficient and proactive threshold proxy signature in the standard model
title_full ID-based efficient and proactive threshold proxy signature in the standard model
title_fullStr ID-based efficient and proactive threshold proxy signature in the standard model
title_full_unstemmed ID-based efficient and proactive threshold proxy signature in the standard model
title_short ID-based efficient and proactive threshold proxy signature in the standard model
title_sort id based efficient and proactive threshold proxy signature in the standard model
topic proactive threshold proxy signature
standard model
identity based cryptography
computational Dif-fie-Hellman problem
url http://www.joconline.com.cn/zh/article/74419804/
work_keys_str_mv AT yuyike1 idbasedefficientandproactivethresholdproxysignatureinthestandardmodel
AT zhengxuefeng2 idbasedefficientandproactivethresholdproxysignatureinthestandardmodel