A novel efficient (t,n) threshold proxy signature scheme

  • Authors:
  • Hui-Feng Huang;Chin-Chen Chang

  • Affiliations:
  • Department of Information Management, National Taichung Institute of Technology, Taichung 404, Taiwan, ROC;Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, ROC

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2006

Quantified Score

Hi-index 0.07

Visualization

Abstract

All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on Schnorr's scheme. Compared with existing (t,n) threshold proxy signature schemes, our scheme can reduce the amount of computations and communications. In our method, not only the original signer can know who generated the proxy signature, but also the receiver can certify the actuality of the group signers who made the proxy signature. We offer convenience and fair distribution of auditing a document's signers.