A threshold proxy signature scheme with nonrepudiation and anonymity

  • Authors:
  • Yuan Yumin

  • Affiliations:
  • Department of Mathematics and Physics, Xiamen University of Technology, Xiamen, P.R. China

  • Venue:
  • ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2004, Shao pointed out that both Sun et al.'s and Hsu et al.'s threshold proxy signature schemes are vulnerable to coalition attack. For enhancing the security, Shao proposed an improved scheme with anonymity to outsiders. This signature scheme is meaningless to any outsider because there is no way for him to prove each individual proxy signing public key validity. We further propose a practical threshold proxy signature scheme to remedy this drawback. The new scheme has the following advantages: (l) Any verifier can check whether the authors of the proxy signature belong to the designated proxy group by the original signer, while outsiders cannot find the actual signers; (2) The original signer can identify the actual proxy signers; (3) The verification of the proxy signing public keys of the proxy signers and the threshold proxy signature can be accomplished within a signature verification procedure simultaneously.