A threshold proxy signature scheme using self-certified public keys

  • Authors:
  • Qingshui Xue;Zhenfu Cao

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R.C.;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R.C.

  • Venue:
  • ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir's threshold secret share scheme. Self-certified public key system has attracted more and more attention because of its advantages. Based on Hsu et al's self-certified public key system and Li et al's proxy signature scheme, one threshold proxy signature scheme is proposed. The new scheme can provide the properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability, known signers and prevention of misuse. In the proxy signature verification phase, the authentication of original and proxy signers' public keys and the verification of the threshold proxy signature are executed together. In addition, the computation overhead and communication cost of the scheme are less than previous works with Shamir's secret share protocol and the public key system based on certificates.