Computer Science ›› 2011, Vol. 38 ›› Issue (3): 40-46.
Previous Articles Next Articles
YU Yi-ke,ZHENG Xue-feng,LIU Xing-bing,HAN Xiao-guang
Online:
Published:
Abstract: At present, the security of the identity based proactive threshold proxy signature schemes was almost proven in the random oracle model, and the threshold value of these schemes was almost changeless. It is more practical to design threshold proxy signature scheme in the standard model, compared with the existing ones. Aiming at the two problems pointed out above, this paper presented a proactive threshold proxy signature scheme by using the hardness of the computational DifficHellman problem with changeable threshold value, based on the modification of Paterson' proposed identity based signature scheme. At last, the scheme's correctness was exactly proven in terms of bilinear pairing technique and its security analysis and prove were given in detail in the assumption of the computational Diffie-Hellman problem, therefore, this scheme was proven secure and reliable.
Key words: Proactive threshold proxy signature, Standard model, Identity based cryptography, Computational Diffie-Hellman problem
YU Yi-ke,ZHENG Xue-feng,LIU Xing-bing,HAN Xiao-guang. ID-based Proactive Threshold Proxy Signature in the Standard Model[J].Computer Science, 2011, 38(3): 40-46.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I3/40
Cited